The ultimate Fabric, Power BI, SQL, and AI community-led learning event. Save €200 with code FABCOMM.
Get registeredEnhance your career with this limited time 50% discount on Fabric and Power BI exams. Ends August 31st. Request your voucher.
Hi, according to your documentation to use the Service Principal authentication the Power bi report should be shared with the Service principal that is the name of the app registered in the Azure Active Directory. Our customers are outside our organization and I'm not able to put the Service principal in the report. Does the app need to be registered under their organization?
Solved! Go to Solution.
Hi @anambedoya ,
To restrict service principal access to specific tenant settings, you can allow access to specific security groups. Alternatively, you can create a dedicated security group for service principals, and exclude it from the desired tenant settings. For steps on how to create a security group and add a service principal, see Create a basic group and add members using Azure Active Directory.
Before using service principals in Power BI, an admin must first enable service principal access in the Power BI admin portal.
In the Power BI Admin portal > Tenant settings, expand Allow service principals to use Power BI APIs, and then click Enabled. To apply permissions to a security group, add the group name to Specific security groups.
In order for your service principal to have the necessary permissions to perform Premium workspace and dataset operations, you must add the service principal as a workspace Member or Admin. Using Workspace access in the Power BI service is described here, but you can also use the Add Group User REST API.
1.In the Power BI service, for a workspace, select More > Workspace access.
2.Search by application name, Add the service principal as an Admin or Member to the workspace.
Refer to :
Use Power BI API with service principal (Preview) | Microsoft Power BI Blog | Microsoft Power BI
Best Regards,
Neeko Tang
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.
Hi @anambedoya ,
To restrict service principal access to specific tenant settings, you can allow access to specific security groups. Alternatively, you can create a dedicated security group for service principals, and exclude it from the desired tenant settings. For steps on how to create a security group and add a service principal, see Create a basic group and add members using Azure Active Directory.
Before using service principals in Power BI, an admin must first enable service principal access in the Power BI admin portal.
In the Power BI Admin portal > Tenant settings, expand Allow service principals to use Power BI APIs, and then click Enabled. To apply permissions to a security group, add the group name to Specific security groups.
In order for your service principal to have the necessary permissions to perform Premium workspace and dataset operations, you must add the service principal as a workspace Member or Admin. Using Workspace access in the Power BI service is described here, but you can also use the Add Group User REST API.
1.In the Power BI service, for a workspace, select More > Workspace access.
2.Search by application name, Add the service principal as an Admin or Member to the workspace.
Refer to :
Use Power BI API with service principal (Preview) | Microsoft Power BI Blog | Microsoft Power BI
Best Regards,
Neeko Tang
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.
Hi @anambedoya ,
If you want to share dashboards or reports to other users , you have to consider Power BI licenses.
Use a security group, not a distribution group, to share with a group that includes people with external email addresses. People with external emails in a distribution group can't see the content you share, unless they're Azure Active Directory (Azure AD) B2B guest users.
You can follow these steps to invite external users to become guest users.
(1)Enable access.
Make sure you enable the Invite external users to your organization feature in the Power BI admin portal before inviting guest users.
(2)Planned invites.
In the Azure portal, select Menu button then select Azure Active Directory.
Under Manage, select Users > All users > New guest user.
Scroll down and enter an email address and personal message.
Select Invite.
(3) Ad hoc invites.
To invite an external user at any time, add them to your dashboard or report through the share feature or to your app through the access page. Here's an example of what to do when inviting an external user to use an app.
Refer to :
https://docs.microsoft.com/en-us/power-bi/admin/service-admin-azure-ad-b2b
https://docs.microsoft.com/en-us/power-bi/guidance/whitepaper-azure-b2b-power-bi
Best Regards,
Neeko Tang
If this post helps, then please consider Accept it as the solution to help the other members find it more quickly.
I'm able to share the workspace with the user that is in a different organization but what I'm not able to do is to share the workspace with the service principal. Is there a way to do it?
Hi @anambedoya
You need to make sure that your service principal is part of an AAD Security Group. you can then add the AAD Security Group to the app permissions.
Hi @GilbertQ, I already added the app to the group but I still can't share the report from the other organization with the service principal, I still get the error I sent above