Događaj
31. ožu 23 - 2. tra 23
Najveći događaj učenja za Fabric, Power BI i SQL. 31. ožujka – 2. travnja. Upotrijebite kod FABINSIDER da uštedite 400 USD.
Registrirajte se već danasOvaj preglednik više nije podržan.
Prijeđite na Microsoft Edge, gdje vas čekaju najnovije značajke, sigurnosna ažuriranja i tehnička podrška.
This article shows how to enable service principal authentication for two types of Microsoft Fabric APIs, read-only and update.
Service principal is an authentication method that can be used to let a Microsoft Entra application access Microsoft Fabric content and APIs.
When you create a Microsoft Entra app, a service principal object is created. The service principal object, also known simply as the service principal, allows Microsoft Entra ID to authenticate your app. Once authenticated, the app can access Microsoft Entra tenant resources.
To enable service principal authentication for Fabric APIs, follow these steps:
Create a Microsoft Entra app. You can skip this step if you already have a Microsoft Entra app you want to use. Take note of the app ID which you'll need in later steps.
Važno
Make sure the app you use doesn't have any admin-consent required permissions for Fabric set on it in the Azure portal. See how to check whether your app has any such permissions.
Create a new Microsoft Entra Security Group and make sure to select Security as the Group type. You can skip this step if you already have a Microsoft Entra security group you'd like to use.
Add your app ID as a member of the security group you created. To do so:
Enable the Fabric admin settings:
Set the toggle to Enabled.
Select the Specific security groups radio button and in the text field that appears below it, add the security group you created in Step 2.
Select Apply.
Service principal authentication is currently supported for the following read-only admin APIs.
An app using service principal authentication that calls read-only admin APIs must not have any admin-consent required permissions for Power BI set on it in the Azure portal. To check the assigned permissions:
Sign into the Azure portal.
Select Microsoft Entra ID, then Enterprise applications.
Select the application you want to grant access to Power BI.
Select Permissions. There must be no admin-consent required permissions of type Application registered for the app.
The service principal can make rest API calls, but you can't open Fabric with service principal credentials.
Fabric admin rights are required to enable service principal in the Admin API settings in the Fabric admin portal.
Događaj
31. ožu 23 - 2. tra 23
Najveći događaj učenja za Fabric, Power BI i SQL. 31. ožujka – 2. travnja. Upotrijebite kod FABINSIDER da uštedite 400 USD.
Registrirajte se već danasObuka
Modul
Use service principal authentication in custom connectors - Training
Learn how to use service principal authentication with custom connectors.
Certifikacija
Microsoft Certified: Identity and Access Administrator Associate - Certifications
Demonstrate the features of Microsoft Entra ID to modernize identity solutions, implement hybrid solutions, and implement identity governance.
Dokumentacija
Admin API admin settings - Microsoft Fabric
Learn how to configure Admin API settings in Fabric.
Automate Power BI Premium workspace and semantic model tasks with service principals - Power BI
Learn how to use service principals for automating Power BI Premium workspace and semantic model management tasks.
Power BI REST APIs semantic model permissions - Power BI
This article lists the Power BI REST APIs semantic model permissions