<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Power Bi Api access token validation in Developer</title>
    <link>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3934211#M52690</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/745830"&gt;@rahulrathor&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Please review the following link, hope its solution can help you.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.auth0.com/t/can-auth0-integrate-powerbi/28100" target="_blank" rel="noopener"&gt;Can Auth0 integrate PowerBI? - Auth0 Community&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;FONT size="2"&gt;There may be two options for this integration:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Option 1 : Provisioning the users on Azure AD with Auth0 identities&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;This option is explained for Office 365 app but the same idea may apply for PowerBI too. In this option, the domain federation is done in Azure AD so it should work for every application that uses Azure AD to authenticate technically.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;On the first link below, there is a sample rule to create any required licenses on the Azure AD side, so that after a user logs in using a 3rd party IdP e.g. Google through Auth0, Office 365 sees the user as a valid user.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;1-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://auth0.com/docs/integrations/office-365-custom-provisioning" target="_blank" rel="noopener"&gt;https://auth0.com/docs/integrations/office-365-custom-provisioning&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;2-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://auth0.com/learn/sprinklr-achieves-impossible-sso-with-auth0/" target="_blank" rel="noopener"&gt;https://auth0.com/learn/sprinklr-achieves-impossible-sso-with-auth0/&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;3-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/federated-identity-for-your-office-365-dev-test-environment" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/microsoft-365/enterprise/federated-identity-for-your-office-365-dev-test-environment&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Option 2: Leveraging Power-BI embedded row security feature:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;With this option, you may send the user’s credentials obtained from a successful authentication through Auth0 to power-bi API as a proof of user identity. Here are some related links showing how to implement this.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;1-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://docs.microsoft.com/en-us/power-bi/developer/embedded-row-level-security#applying-user-and-role-to-an-embed-token" target="_blank" rel="noopener"&gt;Security in Power BI embedded analytics - Power BI | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;2-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://community.powerbi.com/t5/Power-Query/Embedding-and-Report-Filters/td-p/259239" target="_blank" rel="noopener"&gt;Embedding and Report Filters - Microsoft Power BI Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;3-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://github.com/uglide/azure-content/blob/master/articles/power-bi-embedded/power-bi-embedded-app-token-flow.md" target="_blank" rel="noopener"&gt;azure-content/power-bi-embedded-app-token-flow.md at master · uglide/azure-content · GitHub&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/power-bi/developer/embedded/embed-tokens?tabs=embed-for-customers#microsoft-entra-token" target="_self"&gt; Microsoft Entra token&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Use the external&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.postman.com/" data-linktype="external" target="_blank"&gt;Postman&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tool to acquire a token. For more information, see this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.powerbi.com/t5/Developer/Power-BI-REST-API-using-postman-generate-embed-token/m-p/310153#M9157" data-linktype="external" target="_blank"&gt;Power BI Community thread&lt;/A&gt;. The request URL for a service principal must be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token" target="_blank"&gt;https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token&lt;/A&gt;&lt;/CODE&gt;, but for a master user, it can be either&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token" target="_blank"&gt;https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token&lt;/A&gt;&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/common/oauth2/token" target="_blank"&gt;https://login.microsoftonline.com/common/oauth2/token&lt;/A&gt;&lt;/CODE&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Follow the sample solutions at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/" data-linktype="external" target="_blank"&gt;PowerBI-Developer-Samples&lt;/A&gt;. For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Embed for your customers&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20customers/AppOwnsData/Services/AadService.cs" data-linktype="external" target="_blank"&gt;this AadService.cs file&lt;/A&gt;. Find the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;authorityUrl&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;scopeBase&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20customers/AppOwnsData/Web.config" data-linktype="external" target="_blank"&gt;AppOwnsData/Web.config&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Embed for your organization&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20organization/UserOwnsData/Services/Security/OwinOpenIdConnect.cs" data-linktype="external" target="_blank"&gt;this OwinOpenIdConnect.cs file&lt;/A&gt;. Find&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;authorityUrl&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20organization/UserOwnsData/Web.config" data-linktype="external" target="_blank"&gt;UserOwnsData/Web.config&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Best Regards&lt;/P&gt;</description>
    <pubDate>Tue, 21 May 2024 05:57:25 GMT</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <dc:date>2024-05-21T05:57:25Z</dc:date>
    <item>
      <title>Power Bi Api access token validation</title>
      <link>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3931205#M52661</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to consume the PowerBI resource using rest APIs. Is it possible to get the aceess token from Auth0 instead of service principal and configure the PowerBI to validate the aceess token for any rest Api call from Auth0(registered app in Auth0) instead of service principal(resgistered app in Azure portal).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rahul Rathor&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 05:02:15 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3931205#M52661</guid>
      <dc:creator>rahulrathor</dc:creator>
      <dc:date>2024-05-20T05:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Power Bi Api access token validation</title>
      <link>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3934211#M52690</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;a href="https://community.fabric.microsoft.com/t5/user/viewprofilepage/user-id/745830"&gt;@rahulrathor&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Please review the following link, hope its solution can help you.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.auth0.com/t/can-auth0-integrate-powerbi/28100" target="_blank" rel="noopener"&gt;Can Auth0 integrate PowerBI? - Auth0 Community&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;FONT size="2"&gt;There may be two options for this integration:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Option 1 : Provisioning the users on Azure AD with Auth0 identities&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;This option is explained for Office 365 app but the same idea may apply for PowerBI too. In this option, the domain federation is done in Azure AD so it should work for every application that uses Azure AD to authenticate technically.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;On the first link below, there is a sample rule to create any required licenses on the Azure AD side, so that after a user logs in using a 3rd party IdP e.g. Google through Auth0, Office 365 sees the user as a valid user.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;1-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://auth0.com/docs/integrations/office-365-custom-provisioning" target="_blank" rel="noopener"&gt;https://auth0.com/docs/integrations/office-365-custom-provisioning&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;2-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://auth0.com/learn/sprinklr-achieves-impossible-sso-with-auth0/" target="_blank" rel="noopener"&gt;https://auth0.com/learn/sprinklr-achieves-impossible-sso-with-auth0/&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;3-&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/microsoft-365/enterprise/federated-identity-for-your-office-365-dev-test-environment" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/microsoft-365/enterprise/federated-identity-for-your-office-365-dev-test-environment&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;Option 2: Leveraging Power-BI embedded row security feature:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;With this option, you may send the user’s credentials obtained from a successful authentication through Auth0 to power-bi API as a proof of user identity. Here are some related links showing how to implement this.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;1-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://docs.microsoft.com/en-us/power-bi/developer/embedded-row-level-security#applying-user-and-role-to-an-embed-token" target="_blank" rel="noopener"&gt;Security in Power BI embedded analytics - Power BI | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;2-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://community.powerbi.com/t5/Power-Query/Embedding-and-Report-Filters/td-p/259239" target="_blank" rel="noopener"&gt;Embedding and Report Filters - Microsoft Power BI Community&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;3-&lt;SPAN&gt;&amp;nbsp;&lt;A class="" href="https://github.com/uglide/azure-content/blob/master/articles/power-bi-embedded/power-bi-embedded-app-token-flow.md" target="_blank" rel="noopener"&gt;azure-content/power-bi-embedded-app-token-flow.md at master · uglide/azure-content · GitHub&lt;/A&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/power-bi/developer/embedded/embed-tokens?tabs=embed-for-customers#microsoft-entra-token" target="_self"&gt; Microsoft Entra token&lt;/A&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Use the external&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.postman.com/" data-linktype="external" target="_blank"&gt;Postman&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;tool to acquire a token. For more information, see this&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.powerbi.com/t5/Developer/Power-BI-REST-API-using-postman-generate-embed-token/m-p/310153#M9157" data-linktype="external" target="_blank"&gt;Power BI Community thread&lt;/A&gt;. The request URL for a service principal must be&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token" target="_blank"&gt;https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token&lt;/A&gt;&lt;/CODE&gt;, but for a master user, it can be either&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token" target="_blank"&gt;https://login.microsoftonline.com/{tenantID}/oauth2/v2.0/token&lt;/A&gt;&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;&lt;A href="https://login.microsoftonline.com/common/oauth2/token" target="_blank"&gt;https://login.microsoftonline.com/common/oauth2/token&lt;/A&gt;&lt;/CODE&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Follow the sample solutions at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/" data-linktype="external" target="_blank"&gt;PowerBI-Developer-Samples&lt;/A&gt;. For example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Embed for your customers&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20customers/AppOwnsData/Services/AadService.cs" data-linktype="external" target="_blank"&gt;this AadService.cs file&lt;/A&gt;. Find the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;authorityUrl&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;scopeBase&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20customers/AppOwnsData/Web.config" data-linktype="external" target="_blank"&gt;AppOwnsData/Web.config&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;For&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;Embed for your organization&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20organization/UserOwnsData/Services/Security/OwinOpenIdConnect.cs" data-linktype="external" target="_blank"&gt;this OwinOpenIdConnect.cs file&lt;/A&gt;. Find&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;authorityUrl&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/microsoft/PowerBI-Developer-Samples/blob/master/.NET%20Framework/Embed%20for%20your%20organization/UserOwnsData/Web.config" data-linktype="external" target="_blank"&gt;UserOwnsData/Web.config&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 05:57:25 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3934211#M52690</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2024-05-21T05:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Power Bi Api access token validation</title>
      <link>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3959881#M52956</link>
      <description>&lt;P&gt;Hello, I am wondering if what you got as a solution was helpful ? I am about to go through the same journey you are and we are actually thinking of not using Power BI because of the little to no documentation there is about Auth0 authentication registration.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;From thr reply you got Option 1 is not an option for us and besides all of the links provided in it don't work, and option 2 is good but docs area&amp;nbsp; a bit generic. Anyway, just asking in case you were successful in using Auth0 and Power BI.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Cheers!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 06:31:32 GMT</pubDate>
      <guid>https://community.fabric.microsoft.com/t5/Developer/Power-Bi-Api-access-token-validation/m-p/3959881#M52956</guid>
      <dc:creator>dan-data-ces</dc:creator>
      <dc:date>2024-05-30T06:31:32Z</dc:date>
    </item>
  </channel>
</rss>

