Prerequisites

Alation Cloud Service Applies to Alation Cloud Service instances of Alation

Customer Managed Applies to customer-managed instances of Alation

Before you install the Azure Power BI Scanner OCF connector, ensure that you have performed the following:

Enable Network Connectivity

Open outbound TCP port 443 on the Azure Power BI server for the REST API communication.

Set Up the Azure Power BI Scanner

Setting up the Azure Power BI Scanner involves these steps:

Register an Application with Microsoft Entra ID

To register an application with Microsoft Entra ID, refer Register app with Microsoft Entra ID for more information.

  1. Log in to the Azure portal as Cloud Application Administrator or Application Administrator. If the creation of registered applications is not enabled for the entire organization, any one of the roles is required.

  2. Select Microsoft Entra ID.

  3. Click App registrations (on the left pane) > New registration.

  4. Specify a name for your client application in the Name field and then click Register.

  5. From the Overview screen of the new app, copy the values for the following fields and store them in a secure location:

    • Application (client) ID

    • Directory (tenant) ID

  6. Click Certificates & secrets from the left menu on the new app.

  7. On the Certificates & secrets page, in Client secrets section, click + New client secret.

  8. In the Add a client secret screen, specify the following information:

    • Description for your client secret.

    • Expiry

  9. Click Add.

  10. Copy the client secret and store it in a secure location.

Assign Workspace Permissions

Important

This step is not required if you perform the steps in Create a Security Group for Azure Power BI Scanner.

Grant the application you created in Step 1 member-level access to the workspaces you plan to catalog in Alation. Member-level permissions enable the connector to extract report dimensions and dataflows. For steps, refer to following Power BI documentation:

Important

The Power BI Admin must provide member-level access of service principal to at least one workspace.

To assign a Microsoft Power BI workspace role to the security group:

  1. Open the Microsoft Power BI homepage.

  2. From the left menu, click Workspaces and select your workspace.

  3. click Access.

  4. In the resulting panel, specify the email addresses and the name of the security group.

  5. Depending on your workspace settings, set the following values:

    • For workspaces that do not have any parameters defined: Select Viewer from the dropdown.

    • If your workspace has any semantic models with parameters defined: Select Contributor from the dropdown to bring in the parameters to Alation. You must do this for all the existing workspaces for which parameters are defined.

    • To crawl and generate lineage for dataflows, in addition to crawling defined parameters for semantic models: Select Member from the dropdown.

  6. Click Add.

Create a Security Group for Azure Power BI Scanner

Important

This step is not required if you perform the steps in Assign Workspace Permissions.

  1. Log in to the Azure portal as Cloud Application Administrator or Application Administrator.

  2. Select Microsoft Entra ID.

  3. Go to Manage > Groups.

  4. Click New group button.

  5. Set the following values:

    • Set the Group type to Security.

    • Enter a Group name and a Group description (optional).

    • Select No members selected link in Members.

    • For Service Principal authentication, search the application. and click to select it.

  6. Click Select.

  7. Click Create.

Enable Azure Power BI Scanner Service Admin Settings

For an Azure application to be able to access the Power BI content and APIs, a Power BI admin needs to set Enable service principal access in the Power BI admin portal.

  1. Login to Power BI.

  2. From the Settings menu, select the Admin portal:

    ../../../_images/powerb10.png
  3. Navigate to Tenant Settings > Developer Settings and perform the following configuration:

    3.1 Enable Service principals can use Fabric APIs.

    3.2 Select the Specific security groups and select the security group created in Step 3.

    3.3 Click Apply to apply the settings.

    ../../../_images/PowerBI_39.png
  4. Navigate to Tenant Settings > Admin API Settings and perform the following configuration:

    4.1 Enable Allow service principals to use read-only Power BI Admin APIs.

    4.2 Select the Specific security groups and select the security group created in Step 3.

    4.3 Click Apply to apply the settings.

    4.4 Similarly, enable the following flags:

    • Enhance admin APIs responses with detailed metadata

    • Enhance admin APIs responses with DAX and mashup expressions

    ../../../_images/powerb11.png
  5. In Tenant Settings, navigate to Gen1 Dataflow Settings:

    5.1 Enable Create and use Gen1 dataflows to extract the dataflow objects in Alation.

    5.2 Click Apply to save the settings.

    ../../../_images/powerb19.png

    Note

    The service principle requires member-level access to workspaces in Power BI to extract dataflows. The dataflow connection missing error may occur during extraction when workspace permissions are not available.

  6. Under Tenant Settings, navigate to Download Reports:

    6.1 Enabling Download Reports enables you to extract report fields into Alation. It is also required for Column Level Lineage.

    6.2 Click Apply to save the settings.

    ../../../_images/powerb21.png