Summary
This article describes the configuration steps required in Microsoft Entra ID and Power BI Service to allow Power BI access from InfoBurst. Please consult your Microsoft Entra ID and Power BI administrators to determine the required authentication method and complete the steps described in this article.
Authentication Methods
There are three methods of authentication. Consult your Microsoft Entra ID administrator to determine which method is required in your Microsoft environment.
OAuth | Requires an application registered in Microsoft Entra ID (with a secret and callback URI). Allows individual users to access Power BI using OAuth token-based authentication. |
App + Secret | Requires an application registered in Microsoft Entra ID and configured to use a secret value. Allows application-level access to Power BI Workspace(s). |
App + Cert | Requires an application registered in Microsoft Entra ID and configured to use a certificate and private key. Allows application-level access to Power BI Workspace(s). |
OAuth
This authentication method requires a server callback from Microsoft. This callback requires InfoBurst to be SSL-enabled. Enable SSL before proceeding with below steps.
The App Secret has an expiry date designated by the Microsoft Entra ID administrator. An expired Secret will prevent InfoBurst from authenticating to Power BI. Plan to update the Secret in Microsoft Entra ID and Power BI Platform accordingly.
Step 1 (InfoBurst): Obtain Callback URI | - Select System > Configuration > Authentication
- Select OAuthCallbackURI
- Note value for use in Microsoft Entra ID
|
Step 2 (Microsoft Entra ID): Register App | - Select App Registrations
- Select New registration
- Enter a Name
- Under Redirect URI select Web
- Enter Callback URI from Step 1
- Select Register
- Note Application (client) ID and Directory (tenant) ID for use in InfoBurst
- Select Certificates & secrets
- Select New client secret
- Enter Description
- Select Expiry
- Select Add
- Note Value for use in InfoBurst
|
Step 3 (Microsoft Entra ID): Grant API Permissions | - Open App registrations
- Select the App created in Step 1
- Select API Permissions
- Select Add a permission
- Select Power BI Service
- Select Delegated permissions
- Select the following permissions:
- Dataflow > Dataflow.ReadWrite.All
- Dataset > Dataset.ReadWrite.All
- Report > Report.ReadWrite.All
- Workspace > Workspace.ReadWrite.All
- Select Add Permissions
|
Step 4 (InfoBurst): Create Power BI Platform | - Select System > Platforms > New Platform
- Select Type > Power BI
- Enter Name
- Under Microsoft Entra ID Authentication > OAuth enter Application ID, Application Client Secret, and Directory (Tenant) ID
- Select Save
- Select Begin Authentication (new Microsoft authentication tab opens). This step adds Platform Credentials only for the InfoBurst administrator user. See User Access below for user Platform Credentials process.
- Select Accept
- Return to InfoBurst
- Select Close
|
User Access
Each InfoBurst intending to use the Power BI Platform must first add Platform Credentials:
- Select the user profile (username top right)
- Select Platform Credentials
- Select +
- Select the Power BI Platform
- Select Begin Authentication (new Microsoft authentication tab opens)
- Select Accept
- Return to InfoBurst
- Select Close
Token Maintenance
User authentication tokens issued by Microsoft can expire. Use the following process to renew an authentication token:
- Select user profile
- Select Platform Credentials
- Select the Power BI Platform
- Select Update Authentication to renew token
App + Secret
The Application Secret Value has an expiry date designated by the Microsoft Entra ID administrator. An expired Application Secret Value will prevent InfoBurst from authenticating to Power BI. Plan to update the Application Secret Value and Power BI Platform accordingly.
Step 1 (Microsoft Entra ID): Register App | - Select App Registrations
- Select New registration
- Enter a Name
- Select Register
- Note Application (client) ID and Directory (tenant) ID for use in InfoBurst
- Select Certificates & secrets
- Select New client secret
- Enter Description
- Select Expiry
- Select Add
- Note Value for use in InfoBurst
|
Step 2 (Microsoft Entra ID): Grant API Permissions
| - Open App registrations
- Select the App created in Step 1
- Select API Permissions
- Select Add a permission
- Select Power BI Service
- Select Delegated Permissions
- Select the following permissions:
- Dataset > Dataset.ReadWrite.All
- Report > Report.ReadWrite.All
- Workspace > Workspace.ReadWrite.All
- Select Add Permissions
|
Step 3 (Microsoft Entra ID): Add Security Group
| - Select View under Manage Microsoft Entra ID
- Select Groups
- Select New Group
- Group type: Security
- Group name: Add name
- Group description: Add description
- Members: Add App as member
- Select Create
|
Step 4 (Power BI Service): Configure Developer Settings
| - Select the gear icon in the Power BI portal
- Select Admin portal
- Select Tenant settings > Developer settings
- Expand Embed content in apps
- Select Enabled
- Select Apply to > The entire organization
- Select Apply
- Expand Allow service principals to use Power BI APIs
- Select Enabled
- Select Apply to > Specific security groups
- Add Microsoft Entra ID Security Group created in Step 3
- Select Apply
|
Step 5 (Power BI Service): Configure Workspace Access
| - Select Workspaces then ellipsis for target Workspace
- Select Workspace Access
- Enter Security Group name from Step 3
- Select Admin
- Select Add
- Select Close
|
Step 6 (InfoBurst): Create Power BI Platform
| - Select System > Platforms > New Platform
- Select Type > Power BI
- Enter Name
- Select Microsoft Entra ID Authentication > App + Secret
- Enter Application ID, Directory (Tenant) ID, and Application Secret Value
- Select Save
- Select Test Logon
|
App + Cert
Microsoft requires for this authentication method an X.509 certificate (.cer):
https://learn.microsoft.com/en-us/sharepoint/dev/solution-guidance/security-apponly-azuread
The corresponding Personal Information Exchange file (.pfx) and Private Key Password are required for the InfoBurst Power BI Platform described in Step 6 below.
The certificate has an expiry date designated by the certificate creator. An expired certificate will prevent InfoBurst from authenticating to Microsoft Entra ID. Plan to update the certificate in Microsoft Entra ID and Power BI Platform accordingly.
Step 1 (Microsoft Entra ID): Register App | - Select App Registrations
- Select New registration
- Enter a Name
- Select Register
- Note Application (client) ID and Directory (tenant) ID for use in InfoBurst
- Select Certificates & secrets
- Select Certificates
- Select Upload certificate
- Select Select a file to upload certificate
- Select Add
|
Step 2 (Microsoft Entra ID): Grant API Permissions | - Open App registrations
- Select the App created in Step 1
- Select API Permissions
- Select Add a permission
- Select Power BI Service
- Select Delegated Permissions
- Select:
- Dataset.Read.All
- Dataset.ReadWrite.All
- Workspace.Read.All
- Workspace.ReadWrite.All
- Select Add Permissions
|
Step 3 (Microsoft Entra ID): Add Security Group
| - Select View under Manage Azure Active Directory
- Select Groups
- Select New Group
- Group type: Security
- Group name: Add name
- Group description: Add description
- Members: Add App as member
- Select Create
|
Step 4 (Power BI Service): Configure Developer Settings
| - Select the gear icon in the Power BI portal
- Select Admin portal
- Select Tenant settings > Developer settings
- Expand Embed content in apps
- Select Enabled
- Select Apply to > The entire organization
- Select Apply
- Expand Allow service principals to use Power BI APIs
- Select Enabled
- Select Apply to > Specific security groups
- Add Microsoft Entra ID Security Group created in Step 3
- Select Apply
|
Step 5 (Power BI Service): Configure Workspace Access
| - Select Workspaces then ellipsis for target Workspace
- Select Workspace Access
- Enter Security Group name from Step 3
- Select Admin
- Select Add
- Select Close
|
Step 6 (InfoBurst): Create Power BI Platform | - Select System > Platforms > New Platform
- Select Type > Power BI
- Enter Name
- Select Microsoft Entra ID Authentication > App + Cert
- Enter Application ID and Directory (Tenant) ID
- Select Save
- Select Choose File and select the .pfx file
- Enter the Private Key Password
- Select Upload
- Select Save
- Select Test Logon
|
See Also
Platform Configurations
Destinations