Microsoft Fabric Community Conference 2025, March 31 - April 2, Las Vegas, Nevada. Use code FABINSIDER for a $400 discount.
Register nowThe Power BI DataViz World Championships are on! With four chances to enter, you could win a spot in the LIVE Grand Finale in Las Vegas. Show off your skills.
Guys, what’s the safest way to develop a dashboard without direct access to the data? I know some access is usually needed, but this came up in a discussion, and I was curious.
Would using a company-managed virtual machine be the best approach, or are there better security-focused solutions?
Solved! Go to Solution.
@FelipMark I think this question is more on to the access and security on the data source, not more of a Power BI question.
For example, a SQL server, admin can restrict access to what table a user can do, and also have read only access, and control from which IP a user can access. Once it is all in place, it will be the same using data from SSMS or Power BI.
Subscribe to the @PowerBIHowTo YT channel for an upcoming video on List and Record functions in Power Query!!
Learn Power BI and Fabric - subscribe to our YT channel - Click here: @PowerBIHowTo
If my solution proved useful, I'd be delighted to receive Kudos. When you put effort into asking a question, it's equally thoughtful to acknowledge and give Kudos to the individual who helped you solve the problem. It's a small gesture that shows appreciation and encouragement! ❤
Did I answer your question? Mark my post as a solution. Proud to be a Super User! Appreciate your Kudos 🙂
Feel free to email me with any of your BI needs.
@FelipMark If I understand your question correctly, use I have used "jump boxes" in the past in order to develop Power BI reports. Often this is coupled with a VPN for even more security.
In our org, we have VMs that external developers can only access via a private VPN, and they operate under NDAs. Additionally, they log their changes using version control software. It is not much different from any other software development project. And proper oversight requires a scrum master because there are always individuals who refuse to fully comply. There is no complete panacea beyond in-house development. All the mantras: caveat emptor, ymmv, you get what you pay for, etc. apply.
@FelipMark I think this question is more on to the access and security on the data source, not more of a Power BI question.
For example, a SQL server, admin can restrict access to what table a user can do, and also have read only access, and control from which IP a user can access. Once it is all in place, it will be the same using data from SSMS or Power BI.
Subscribe to the @PowerBIHowTo YT channel for an upcoming video on List and Record functions in Power Query!!
Learn Power BI and Fabric - subscribe to our YT channel - Click here: @PowerBIHowTo
If my solution proved useful, I'd be delighted to receive Kudos. When you put effort into asking a question, it's equally thoughtful to acknowledge and give Kudos to the individual who helped you solve the problem. It's a small gesture that shows appreciation and encouragement! ❤
Did I answer your question? Mark my post as a solution. Proud to be a Super User! Appreciate your Kudos 🙂
Feel free to email me with any of your BI needs.
That makes sense, thanks!
@FelipMark not fully sure about your question, the common way is to create a semantic model in Power BI, publish it to the service and then let use connect to this model and create report.
Subscribe to the @PowerBIHowTo YT channel for an upcoming video on List and Record functions in Power Query!!
Learn Power BI and Fabric - subscribe to our YT channel - Click here: @PowerBIHowTo
If my solution proved useful, I'd be delighted to receive Kudos. When you put effort into asking a question, it's equally thoughtful to acknowledge and give Kudos to the individual who helped you solve the problem. It's a small gesture that shows appreciation and encouragement! ❤
Did I answer your question? Mark my post as a solution. Proud to be a Super User! Appreciate your Kudos 🙂
Feel free to email me with any of your BI needs.
Let’s say a company hires an external developer to create a dashboards and handling the entire ETL process, but we don’t want to give them direct access to our raw data. What would be the best security-focused approach?
Would a company-managed virtual machine with restricted access be a good solution, or are there other best practices to ensure data security while allowing development?
March 31 - April 2, 2025, in Las Vegas, Nevada. Use code MSCUST for a $150 discount!
Check out the February 2025 Power BI update to learn about new features.
User | Count |
---|---|
86 | |
76 | |
52 | |
39 | |
35 |
User | Count |
---|---|
95 | |
69 | |
55 | |
52 | |
46 |