Check your eligibility for this 50% exam voucher offer and join us for free live learning sessions to get prepared for Exam DP-700.
Get StartedDon't miss out! 2025 Microsoft Fabric Community Conference, March 31 - April 2, Las Vegas, Nevada. Use code MSCUST for a $150 discount. Prices go up February 11th. Register now.
So microsoft documentation says this account needs to be a global admin in Azure AD.
Doesn't accept any MFA setup, nor does an app password work.
I seriously can't have a service account running our application stack running as a global admin with some type of security on the account. Anyone have security requirements for how to set this up? i've tried conditional access rules, but we're routinely having to cycle the rule. Now management has requested to keep the rule off.
I can't accept that this is normal. Anyone have any info here for us?
Solved! Go to Solution.
Hi @Anonymous / @DiogoGuiomar ,
You can use SPN autentication which is more secure
https://docs.microsoft.com/en-us/power-bi/developer/embed-service-principal
Just upgrade your workspace to v2 if you are using classical workspace.
Issue resolved !
Hi @Anonymous / @DiogoGuiomar ,
You can use SPN autentication which is more secure
https://docs.microsoft.com/en-us/power-bi/developer/embed-service-principal
Just upgrade your workspace to v2 if you are using classical workspace.
Issue resolved !
Oh yeah... we swapped to that back in July... Works fantastic, and got rid of our dumb "master accounts" . 🙂 . Soooo happy.
Did you find any solution for this?
I'm having the same problem
User | Count |
---|---|
9 | |
1 | |
1 | |
1 | |
1 |