# Entra ID Management

This feature enables DataCentral administrators to authenticate using their Azure Active Directory (AAD) credentials and exercise their rights through an [Authentication Service Principal](https://uidata.gitbook.io/datacentral-knowledge-center/deployments/authentication-service-principal). This Principal is consented with delegated permissions, allowing AAD users to manage and organize security groups they are marked as "owners" of within Entra ID.&#x20;

As a result, administrators gain the ability to control Entra ID security groups linked to Power BI entities, thereby governing both internal and external user access to these entities in a single place.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FUSdfk3UjtNggk4hfptwC%2Fimage.png?alt=media&#x26;token=ccf7a433-7314-49f4-acce-9e6d6eb956b1" alt=""><figcaption><p>Overview - Entra ID report</p></figcaption></figure>

* [How it works](#how-it-works)
* [Overview - Entra ID report](#overview-entra-id-report)
* [Diagram](#diagram)

### How it works

{% hint style="info" %}
To configure the Authentication Service Principal correctly, please refer to the documentation provided [here](https://uidata.gitbook.io/datacentral-knowledge-center/deployments/authentication-service-principal).
{% endhint %}

In DataCentral, Azure AD users can be assigned the role of '*Entra ID administrator*', granting them access to link their Entra ID security group to DataCentral in '*Organization Unit'*.

All activities are recorded and can be seen in the '*Overview - Entra ID report*'

Users assigned the role of '*Entra ID administrator*' needs to be the '*owner*' of the Entra ID group they intend to manage through DataCentral.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2Fa81c0OL1S1PzLUOOOMyj%2Fimage.png?alt=media&#x26;token=e0c9c2ae-bbcb-4d7f-8e22-e83338b102f4" alt=""><figcaption><p>Example of Entra ID security group 'owner'</p></figcaption></figure>

Actions that an 'Entra ID administrator' can perform:

* [Link Entra ID security group](#link-entra-id-security-group)
* [Adding member to security group](#adding-member-to-security-group)
* [Removing member from security group](#removing-member-from-security-group)

#### Link Entra ID security group

Within DataCentral, the administrator can navigate to '*Organization Unit'*, click '*+ Add root unit*', and link the security group. For example if the administrator is '*owner*' of the security group '*PBI X*':

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FrnS7o41qvoCfF8LoiUya%2Fimage.png?alt=media&#x26;token=9d7bf2c8-5fd9-42a6-837a-09375808a9a2" alt=""><figcaption><p>Adding Entra ID security group</p></figcaption></figure>

After adding a new security group to DataCentral, click '*Preview comparison*' to compare the DataCentral group with the Entra ID group. If members already exist in the Entra ID group, they will be added to the DataCentral system; otherwise, no changes will be detected.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FMCRznRUJl7CssDcLdJlg%2Fimage.png?alt=media&#x26;token=8633f68d-b7b8-45ec-8008-c41bb9a24d4b" alt=""><figcaption><p>'PBI X' added to DataCentral</p></figcaption></figure>

In this case '*PBI X*' has members in Entra ID security group and they will be added to DataCentral '*Organization Unit*' and to '*Users*' when administrator clicks '*Confirm*'.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FIlzdJofPFp1ooqauJURK%2Fimage.png?alt=media&#x26;token=0d6cf628-154b-454f-94cc-67674ed95bad" alt=""><figcaption><p>Left are DataCentral actions to be made; Right is Entra ID group members.</p></figcaption></figure>

After '*Confirmation*,' the security group has been synced, and the administrator can manage the group as desired by removing or adding members to it.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2Fs9aYf84tTpKrq1QFLN2D%2Fimage.png?alt=media&#x26;token=fb110d61-1bad-474c-95f3-cd046ba87db7" alt=""><figcaption><p>After initial sync between systems</p></figcaption></figure>

The '*Overview - Entra ID report*' shows current state of all groups that are managed by DataCentral. Here the '*PBI X*' group can be seen and members that are within that group.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FHvuNkb9j5nbvgKOIFtZl%2Fimage.png?alt=media&#x26;token=e01d3370-60f3-427b-981d-22c9e49d22cf" alt=""><figcaption><p>Overview - Entra ID report</p></figcaption></figure>

#### Adding member to security group

To add a new member to security group go to 'Organization Unit' there are two ways.

1. Add member to security group through 'Organization Unit'

* Click on security group and then '+Add Member'
* Click 'Add Member' and choose member(s) to be added.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FrSl5Du1VxsVcraj1W4lk%2Fimage.png?alt=media&#x26;token=5ef5d585-a6a3-4795-9e2a-cc5beaa7814c" alt=""><figcaption><p>Add member through 'Organization Unit'</p></figcaption></figure>

* List of member(s) to add to security group.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FxyXyjpOkIADyFZTXqAxP%2Fimage.png?alt=media&#x26;token=cdb68af6-073f-4989-9a77-b2e482127764" alt=""><figcaption><p>List of Users</p></figcaption></figure>

2. Add member to security group through '*User Management*'

* Click on '*+ Create new user*'
* Enter email address and then navigate to '*Organization Unit*'
* Pick security group to add user to and '*Save*' to confirm

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F8UBe1YV0KeyNa2wBbHa0%2Fimage.png?alt=media&#x26;token=50c03ad9-96c0-4ee8-8ee2-867aa74a24da" alt=""><figcaption><p>Add user to security group through 'User Management'</p></figcaption></figure>

Both ways lead to same result, user has been added to security group.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2Fr4Y6YYx6gzfFD5GkXz5I%2Fimage.png?alt=media&#x26;token=190e369a-8bef-49cc-98b7-b2a937360689" alt=""><figcaption><p>User added to security group</p></figcaption></figure>

#### Removing member from security group

To remove member(s) from security group go to '*Organization Unit*'.

* Pick security group that member will be removed from.
* Click on 'X' on the left of the User that will be removed.
* Confirm action by clicking 'Yes'

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F84w2VpPsmsHAZYhvbmIK%2Fimage.png?alt=media&#x26;token=7dfd19a7-1afa-4cf5-9999-2a12d857ad66" alt=""><figcaption><p>Remove member from security group 'PBI X'</p></figcaption></figure>

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FX3FCPViX5jY1Vz4dYsIt%2Fimage.png?alt=media&#x26;token=eaf322a9-6c86-403e-8abf-647d1633dc7e" alt=""><figcaption><p>Member been removed from Entra ID security group 'PBI X'</p></figcaption></figure>

### Overview - Entra ID report

The purpose of the report is to display the current state of security groups linked to the DataCentral tenant.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FeUqBcBHm5DFNitTY4Ic2%2Fimage.png?alt=media&#x26;token=a91a4bcf-a296-4377-9cbb-f0e070a122a4" alt=""><figcaption><p>Overview - Entra ID report</p></figcaption></figure>

In the top right corner user is able to see that he is viewing the report and a timestamp when the last Entra ID sync was made to DataCentral.&#x20;

Entra ID Sync is a functionality that captures a snapshot of security groups within Entra ID that are linked to DataCentral. This ensures that only security groups associated with DataCentral are are recorded.

If discrepancies exist between Entra ID and DataCentral security groups, a record with an icon indicating an outlier will be displayed under '*Discrepancies Entra ID / Misræmi Entra ID*'.

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FLIJUBfilwTB3K5JyvXo6%2Fsync%20(1).png?alt=media&#x26;token=c5c707dc-69c4-4480-a732-b1685b907cb7" alt="" data-size="line">  Member was added to Entra ID group within Azure Portal and will be synced to DataCentral.

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2Fd6qNjDB1j799KbKBcgA9%2Fwarning%20(1).png?alt=media&#x26;token=9e6783eb-29ca-47b0-9744-57d61b8df9ce" alt="" data-size="line">  Member was removed from Entra ID group within Azure Portal, investigate.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FUaEnyr5znwUkOOHkpMMr%2Fimage.png?alt=media&#x26;token=5b212849-b0e1-4916-9dc0-e0c7f2ed065d" alt=""><figcaption><p>Authenticated user and discrepancies</p></figcaption></figure>

All security groups ("öryggishópar") linked to the DataCentral tenant.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FZx9GEz1elsLaePZb9Yj4%2Fimage.png?alt=media&#x26;token=9f60f16a-d03b-4f76-82fe-ece5c162f3d4" alt=""><figcaption><p>Security groups linked to tenant</p></figcaption></figure>

All users ('*notendu*r) existing within the tenant, along with icons indicating their user types within the DataCentral tenant.

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F5ogYk9tZWkEy9Lscz5Zl%2Fstar.png?alt=media&#x26;token=b64cefcc-2e2f-45cd-92b1-e17cbf0c0531" alt="" data-size="line">  User is an 'Entra ID administrator'

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F7BHNsrOTMsXOhtAOcYEz%2Fazure_internaluser_logo_color.svg?alt=media&#x26;token=54102120-f5da-427a-9d2f-730d17246e54" alt="" data-size="line">  Azure AD user

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FbcZN6OymxiUnaJPM6lZu%2Feaad.png?alt=media&#x26;token=d53e24a7-27a3-400a-94d6-d6d2d3d03958" alt="" data-size="line">  External Azure AD user

<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FIxP1VodYyK37TTi029Cy%2Fuser%20(1).png?alt=media&#x26;token=9712a1ba-3162-40b9-bbf5-3cc13005aa75" alt="" data-size="line">  System User (User Pass)

&#x20;<img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F90Yrc3f1FFrbusdmDTMQ%2Fdo-not-enter.png?alt=media&#x26;token=73d4529d-3cea-4ecb-97e6-8b8821fc8747" alt="" data-size="line"> Azure AD disabled in Entra ID

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FV4UJZFjr8JSFtEGyaiZ2%2Fimage.png?alt=media&#x26;token=e5397c09-7c65-4a8e-ac09-f9de59f55a94" alt=""><figcaption><p>Users that exist in tenant</p></figcaption></figure>

Action logs that record activities by administrators with security groups within tenant.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2F9WzkOe7kt1hCYM61boXZ%2Fimage.png?alt=media&#x26;token=db54577a-46b4-4bbd-893c-758c01b5d573" alt=""><figcaption><p>Administrator action log</p></figcaption></figure>

### Diagram

A comprehensive overview of the components involved in implementing 'Entra ID Management' is provided. Once implemented, Entra ID security groups are fully managed within your DataCentral tenant, allowing users to access Power BI entities through their assigned security groups.

Subsequently, Power BI report administrators within the DataCentral tenant can embed reports that users now have access to via these security groups. When a user authenticates to the DataCentral tenant, they will see reports accessible to their assigned security group.

Administrators can effortlessly add or remove internal and external users from these groups, completing the entire user-cycle management within Power BI.

<figure><img src="https://1952150759-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FfEoiVXBZDmtsCCNsaMab%2Fuploads%2FnQpSk0VUcFNo9hDCUzY1%2Fimage.png?alt=media&#x26;token=a1951474-e4b4-428c-a149-1d0d51b0ec7d" alt=""><figcaption></figcaption></figure>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://uidata.gitbook.io/datacentral-knowledge-center/product-guides/entra-id-management.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
