PowerBI

Follow these steps to connect your PowerBI instance to Select Star.

Before you start

Please make sure your datasets are refreshed frequently (either via scheduled refresh or on-demand).

To connect PowerBI to Select Star, you will need...

  • Access to the Global administrator account for the Azure Active Directory.

  • Access to Power BI admin for the PowerBI.

Select Star requires only minimal metadata access to PowerBI. Here are the list of access Select Star will request for:

  • "allow service principals to use Power BI APIs"

  • "allow service principals to use read-only Power BI admin APIs"

  • "Contributor" role in each ingested workspace

1. Create an Azure AD app

1. Open Azure Portal and sign in.

2. Search for App registrations and select App registrations link.

Screenshot shows where to click "App registration" link in menu.

3. Click New registration.

Screenshot shows where to click "New registration" button in menu.

4. Fill form in the required information:

  • Name - type "Select Star"

  • Supported account types - Select "Accounts in this organizational directory only"

  • (Optional) Redirect URI - leave empty

5. Click Register.

Screenshot shows the filled registration form.

6. After submitting the form, the Application ID is available from the Overview tab. Copy and save the Application ID for later use.

Screenshot shows where to obtain an Application ID in the Overview tab

7. Click the Certificates & secrets tab.

Screenshot shows the certificates and secrets tab for an app in the App registrations section.

8. Click the New client secret button.

Screenshot shows the new client secret button in the Certificates and secrets tab.

In the Add a client secret window, enter any description, specify when you want the client secret to expire, and click Add.

Copy and save the Client secret value.

Screenshot shows where to obtain the Client secret value in the Certificates and secrets tab

2. Create an Azure AD security group

1. Open Azure Portal and sign in using a Global administrator account for the directory.

2. Search for Azure Active Directory and select Azure Active Directory link.

Screenshot shows where to click "App registration" link in menu.

3. The Tenant ID is available from the Overview tab. Copy and save the Tenant ID for later use.

Screenshot shows where to obtain the Tenant ID value in the Overview tab

4. Click the Groups tab.

Screenshot shows the Groups tab for an app in the Azure Active Directory section.

5. Click the New group button.

Screenshot shows the new group button in the Groups tab.

6. Fill form in the required information:

  • Group type - select "Security"

  • Name - type "PowerBI-API access"

  • Group description - enter any description or leave empty

7. Select "No members selected" to open a drawer. Search for Select Star and select Select Star entry. Click the Select button to confirm.

8. Click Create.

Screenshot shows the filled form.

3. Enable the Power BI service admin settings

1. Open Power BI admin portal and sign in.

2. Log into the Power BI admin portal. You need to be a Power BI admin to see the tenant settings page.

3. Ensure that Tenant settings tab are open.

Screenshot shows the Tenant settings tab in Power BI admin portal.

4. Search for the subsection "Allow service principals to use Power BI APIs" in "Developer settings" section and open it. Select "Enabled" and add the security group you created "PowerBI-API access" in Azure AD. Click Apply.

Screenshot shows the "Allow service principals to use Power BI APIs" subsection in "Developer settings" section of the Tenant settings tab.

5. Repeat process for all subsection in "Admin API settings" section. Open the section, Select "Enabled" and add the security group you created "PowerBI-API access" in Azure AD. Click Apply. You must complete the step for following sections:

  • Allow service principals to use read-only admin APIs

  • Enhance admin APIs responses with detailed metadata

  • Enhance admin APIs responses with DAX and mashup expressions

  • Download Reports

The screenshot shows the "Allow service principals to use read-only Power BI admin APIs" subsection in the "Admin API settings" section of the Tenant settings tab.
The screenshot shows the "Enhance admin APIs responses with detailed metadata" subsection in the "Admin API settings" section of the Tenant settings tab.
The screenshot shows the "Enhance admin APIs responses with DAX and mashup expressions" subsection in the "Admin API settings" section of the Tenant settings tab.
The screenshot shows the "Download Reports" subsection in the "Admin API settings" section of the Tenant settings tab.

4. Add Azure AD app to your workspace

1. Open Power BI and sign in.

2. Search to the workspace you want to enable access for, and from the More menu, select Workspace access.

Screenshot shows the "Workspace access" button in workspace list.

3. Fill form in the required information:

  • Search for Select Star as member and select Select Star entry.

  • Permission - select "Contributor"

Screenshot shows the "Workspace access" button in workspace list.

4. Click Add button to add.

5. Click Close button to confirm.

5. Connect PowerBI API to Select Star

1. Go to the Select Star Settings. Click Data in the sidebar, then + Add to create a new Data Source.

Screenshot shows the "Add Data source" tab for PowerBI in Select Star.

2. Fill form in the required information:

  • Client ID: Application ID of Azure AD. You'll see this after completing step 1.6 of the instructions.

  • Client Secret: Client secret of Application in Azure AD. You'll see this after completing step 1.8 of the instructions.

  • Tenant ID: Identifier of tenant of organization in Azure Active AD. You'll see this after completing step 2.3 of the instructions.

Last updated