I want to share my dashboard with external users. For this, I am using Tutorial: Embed Power BI content using a sample embed for your customers application. I am able to create a user in my Azure AD and now I am at Set up your Power BI embedding environment. Here I am unable to Grant Permission to my user.
Any help would be appreciated.
Related
I have Power BI Embedded capacity and currently use it to embed reports from my power bi service into a web based portal.
A customer has asked if I can connect to their workspaces from my tenant and embed their reports.
Is it possible to do this? What would the customer need to do on their end to allow me to access the workspaces?
Embedding can be made with user credentials (user name and password) from their tenant (usually used with embed for your organization, a.k.a. user owns data), or with service principal (application ID and secret) from their tenant (usually used with embed for your customers, a.k.a. app owns data). So they must give you their tenant ID (needed for the embedding). Then, depending on how you embed the Power BI elements, proper credentials.
Also, to make a note, that you can't assign their workspaces to your Power BI Embedded capacity, so probably they will need to get a dedicated capacity for their tenant too.
Recently I have been trying to connect a Google BigQuery database in Power BI Desktop. even though I managed to configure this I am not getting my total databases. To be precise, my private databases. I need to know why is that and about what permissions/IAM role I need, to configure this.
Thanks for any help.
I tried to connect using GCP credentials(company credentials). What I want is, I want all the databases loaded to Power BI and I want to know about the permission details for submission purposes.
IS Azure subscript required to use power BI embedded Service Principal login?
I dont have subscript and I am trying to login using Service Principal login ,
it give me Unauthorized.
I am following this below link.
https://learn.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal#assign-the-application-to-a-role
Authenticating with service principal works and requires the new workspaces experience, i.e. you need Power BI Pro account for that. But you don't need to pay for separate Azure subscription. In Azure portal you need to create a security group and add the registered application in it, which you can do for free.
How do we create subscription for report in Power BI that is using underlying tabular model? Power BI is giving error while creating subscription saying "You cannot subscribe others because this artifact has row-level security or the dataset is using a Live Connection to Analysis Services"
I could create subscription for myself as I am admin for the workspace. But I can not add other email IDs in the subscription.
Row-level security (RLS) with Power BI is used to restrict data access for given users.
One workaround could be to add your co-workers as members of the workspace. because in Power BI service, members of a workspace have access to datasets in the workspace. RLS doesn't restrict this data access.
For more info, you can see this:
RLS in Power BI
I've connected to an on premises SSAS data source with Power BI Desktop and could successfully publish to the web.
I would like to share the datasets themselves with users outside my organisation so that they can drag/drop the dimensions/measures and create reports and dashboards or reports that they would like to see.
From what I've read it's only possible to share preconfigured dashboards and reports with users outside my organisation. Could someone please tell me if it is possible to share the datasets themselves with users outside my organisation?
If you help the external company setup an On premises data gateway on a VM in your network and help them get it connected to your cube the the external users can publish the Power BI Desktop report to their Power BI tenant. Is there role based security in your cube that would apply to external users? If so you will need to setup an alternate UPN suffix and user accounts for the external users on your domain as described here. Or you could setup user mappings to use CustomData to pass their username in to your cube that way. With CustomData you change your SSAS roles to have only a service account as a member (not real users) then use the CustomData() MDX function in the dynamic security MDX expressions.
The whole scenario is described more fully here. Though I was talking about hosting in Azure with VMs joined to AAD Domain Services, you could so it with alternate UPN suffixes or CustomData in a regular Active Directory domain.
If your model is Tabular then Azure Analysis Services may greatly simplify the matter. If that's of interest let me know.