DataCentral Knowledge Center
  • Overview
    • 👋Welcome to DataCentral
    • 🌠What is new?
  • Product Guides
    • 👨‍🎓Instance Management
    • 👷‍♂️User & Role Management
    • 🔐Entra ID Management
    • 💻Item Management
    • ✅Tutorials
    • ✨Features
    • 🧩ISV for Report Embedding
  • Deployments
    • 🛠️Tenant Step-by-Step
      • 📝Tenant Setup Guide
      • 💻Embedding Reports in Your Tenant
      • 🔐Governance and Security
      • 🧑Inviting Your Team
    • 💡Power BI Service Principal
    • 🔏Graph Service Principal
    • 🔒Authentication Service Principal
  • Use Cases / User Stories
    • 🏘️User Stories
  • WIP
    • 💎Subscription Tiers
    • 💬FAQ
Powered by GitBook
On this page
  • Authentication Service Principal - step by step
  • DataCentral host instance and your tenants
  • Why use different authentication service principals for your tenants?
  1. Deployments

Authentication Service Principal

Creation and Configuration - step by step

PreviousGraph Service PrincipalNextUser Stories

Last updated 8 months ago

Adding your own "Authentication Service Principal" in DataCentral simplifies user and security management, reduces IT overhead, ensures compliance, and enhances the user experience by allowing access with familiar Microsoft credentials.

In DataCentral host settings, you can configure three Authentication Service Principals with different permissions, which Azure AD users must accept on their first login. This enables tenants to authenticate users with varying permission levels.

In this guide we will set up three authentication service principals:

  1. Authentication only

  2. Authentication + Power BI resource access

  3. Authentication + Power BI and security group resource access

Permission matrix for 'Authentication Service Principal'.

API Permission
Authentication only
+ Power BI
+ security group

User.Read

App.Read.All

Dashboard.Read.All

Dataset.Read.All

Dataset.ReadWrite.All

Report.Read.All

Report.ReadWrite.All

Workspace.Read.All

Group.Read.All

Group.Member.ReadWrite.All

Authentication Service Principal - step by step

The primary goal of the "Authentication App Registration" is to verify the identities of users accessing the DataCentral system.

Additionally, it fulfils a dual-purpose role:

  • Firstly, it allows users to gain access to their Power BI entities through DataCentral.

  • Secondly, it enables administrators to manage and organize security groups within Entra ID for which they are designated as "owners."

Prerequisites

  • Active Azure account and subscription

  • Administrative permissions in the Azure Portal

    • Choose "Accounts in any organizational directory (any Microsoft Entra ID tenant Multitenant)"

    • Put in your "Redirect URI" for Single-page application (SPA)

  1. Go to "Authentication Settings" and add additional "Redirect URIs" if needed.

  2. Go to "API Permissions" and add necessary permissions.

Authentication only

Permissions for the first authentication service principal:

Authentication + Power BI resource access

Permissions for the second authentication service principal: All permissions above + delegated permissions for accessing user Power BI entities.

Authentication + Power BI and security group resource access

Permissions for the third authentication service principal: All permissions above + delegated permissions for administration of user security group:

The following permissions require either 'Grant admin consent' or approval from an admin in the relevant Azure tenant through the authentication process.

'Granting admin consent' will accept these permissions on behalf of all internal users in your Entra ID. When external Azure AD users log in for the first time, they will have to accept these permissions, and if they are an admin, they can also 'Grant admin consent' for their own Entra ID.

  1. Go to "Overview" and get the "Application (client) ID" that will be used later on.

  1. Go to "Branding & properties" and fill in this information.

    • "Upload new logo": Upload relevant logo (optional)

    • "Home page URL": Enter a URL to your Home page (optional)

    • "Terms of service URL": Enter a URL to your Terms of Service (optional)

    • "Privacy statement URL" : Enter a URL to your privacy statement (optional)

    • "Publisher verification": Enter your partner ID to verify the application (mandatory)


DataCentral host instance and your tenants

Under 'Administration Settings' -> 'Azure Configurations' in your host instance input the values 'Application (client) ID' collected from Azure Portal for each of your Authentication Service Principal.

There are three available authentication input fields:

  • Authentication and resource access application (client) ID

  • Authentication + Power BI resource access application (client) ID

  • Authentication + Power BI and security group resource access application (client) ID

After your host instance configurations go to one of your tenants and under 'Administration Settings -> Security' you are able to control which Authentication your Azure AD users will authenticate against.

The choices available are linked to the authentication service principal configured in the host instance:

  • Authentication only

  • Authentication + Power BI resource access

  • Authentication + Power BI and security group resource access


Why use different authentication service principals for your tenants?

Authentication only service principal

This authentication method ensures that you request only the minimum necessary permissions for users in tenant.

The 'User.Read' permission allows the application to access basic profile information of the signed-in Azure AD user, such as their name, email, and tenant details. This is essential for personalizing user experiences, displaying relevant account details, and ensuring that the correct user is authenticated within the app.

On first login, AAD user only has to accept one permission:

Authentication + Power BI resource access

This authentication method ensures that you request the same permissions for authentication as well additional for the Power BI entities the AAD user has access to within their organization or your company.

On first login, AAD has to accept these permissions:

Authentication + Power BI and security group resource access

This authentication method ensures that you request the same permissions as above, with the additional requirement of permissions related to security groups in your Entra ID.

On first login, AAD has to accept these permissions:

Go to your and register a new App Registration in Microsoft Entra ID.

Because we are not requesting any permissions for Power BI or security groups here. We will have to use a to embed reports for this tenant.

With these permissions granted, your AAD users can use their own Power BI Pro licenses to embed reports without requiring a Power BI Service Principal. However, they must have access to the workspace they are embedding from; otherwise, the process will default to the configured .

By accepting these permissions, you can use ',' which allows your administrative AAD users to manage and organize the security groups they are designated as 'owners' of within Entra ID and add users to these groups through DataCentral.

🔒
Azure Portal
Power BI Service Principal
Power BI Service Principal
Entra ID Management
Authentication from lower to higher permissions
Location "App Registration"
Properties for new application
Optional additional "Redirect URIs"
Permissions Authentication Only
Permission Authentication Power BI
Permission Authentication Securitu Group
Location of "Application (client) ID"
Publisher verification
Authentication Configurations
Authentication methods