Uredi

Deli z drugimi prek


Power BI implementation planning: Tenant-level security planning

Note

This article forms part of the Power BI implementation planning series of articles. This series focuses primarily on the Power BI experience within Microsoft Fabric. For an introduction to the series, see Power BI implementation planning.

This tenant-level security planning article is primarily targeted at:

  • Fabric administrators: The administrators who are responsible for overseeing Power BI in the organization.
  • Center of Excellence, IT, and BI team: The teams that are also responsible for overseeing Power BI. They might need to collaborate with administrators of Power BI, information security teams, and other relevant teams.

This article might also be relevant for self-service Power BI creators who create, publish, and manage content in workspaces.

The series of articles is intended to expand upon the content in the Power BI security white paper. The Power BI security white paper focuses on key technical subjects such as authentication, data residency, and network isolation. The implementation planning series provides you with considerations and decisions to help you plan for security and privacy.

Because Power BI content can be used and secured in different ways, content creators make many tactical decisions. However, there are some strategic planning decisions to make at the tenant level, too. Those strategic planning decisions are the focus for this article.

We recommend that you make the tenant-level security decisions as early as possible because they affect everything else. Also, it's easier to make other security decisions once you have clarity on your overall security goals and objectives.

Power BI administration

The Fabric administrator is a high-privilege role that has significant control over Power BI. We recommend that you carefully consider who is assigned this role because a Fabric administrator can perform many high-level functions, including:

  • Tenant settings management: Administrators can manage the tenant settings in the admin portal. They can enable or disable settings and allow or disallow specific users or groups within settings. It's important to understand that your tenant settings have a significant influence on the user experience.
  • Workspace role management: Administrators can update workspace roles in the admin portal. They can potentially update workspace security to access any data or grant rights to other users to access any data in the Power BI service.
  • Personal workspace access: Administrators can access contents and govern the personal workspace of any user.
  • Access to tenant metadata: Administrators can access tenant-wide metadata, including the Power BI activity logs and activity events retrieved by the Power BI admin APIs.

Tip

As a best practice, you should assign between two and four users to the Fabric administrator role. That way, you can reduce risk while ensuring there's adequate coverage and cross-training.

An administrator of Power BI is assigned at least one of these built-in roles:

  • Fabric Administrator
  • Power Platform Administrator
  • Global Administrator - this is a high privilege role and membership should be limited.

When assigning administrator roles, we recommend that you follow best practices.

Note

While a Power Platform administrator can manage the Power BI service, the inverse isn't true. Someone assigned to the Fabric administrator role can't manage other applications in the Power Platform.

Checklist - When planning for who will be a Fabric administrator, key decisions and actions include:

  • Identify who's currently assigned the administrator role: Verify who's assigned to one of the roles that can administer Power BI.
  • Determine who should manage the Power BI service: If there are too many administrators, create a plan to reduce the total number. If there are users assigned as administrators for Power BI who aren't well-suited to such a high-privilege role, create a plan to resolve the issue.
  • Clarify roles and responsibilities: For each administrator of Power BI, ensure that their responsibilities are clear. Verify that appropriate cross-training has occurred.

Security and privacy strategies

You need to make some tenant-level decisions that relate to security and privacy. The tactics taken and the decisions you make rely on:

  • Your data culture. The goal is to encourage a data culture that understands that security and protection of data is everyone's responsibility.
  • Your content ownership and management strategies. The level of centralized and decentralized content management significantly affects how security is handled.
  • Your content delivery scope strategies. The number of people who view content influences how security should be handled for the content.
  • Your requirements to comply with global, national/regional, and industry regulations.

Here are a few examples of high-level security strategies. You might choose to make decisions that affect the entire organization.

  • Requirements for row-level security: You can use row-level security (RLS) to restrict data access for specific users. That means different users see different data when accessing the same report. A Power BI semantic model or a data source (when using single sign-on) can enforce RLS. For more information, see the Enforce data security based on consumer identity section in the Report consumer security planning article.
  • Data discoverability: Determine the extent to which data discoverability should be encouraged in Power BI. Discoverability affects who can find semantic models or datamarts in the data hub, and whether content authors are allowed to request access to those items by using the Request access workflow. For more information, see the customizable managed self-service BI usage scenario.
  • Data that's permitted to be stored in Power BI: Determine whether there are certain types of data that shouldn't be stored in Power BI. For example, you might specify that certain sensitive information types, like bank account numbers or social security numbers, can't be stored in a semantic model. For more information, see the Information protection and data loss prevention article.
  • Inbound private networking: Determine whether there are requirements for network isolation by using private endpoints to access Power BI. When you use Azure Private Link, data traffic is sent by using the Microsoft private network backbone instead of going across the internet.
  • Outbound private networking: Determine whether more security is required when connecting to data sources. The Virtual Network (VNet) data gateway enables secure outbound connectivity from Power BI to data sources within a VNet. You can use an Azure VNet data gateway when content is stored in a Premium workspace.

Important

When considering network isolation, work with your IT infrastructure and networking teams before you change any of the Power BI tenant settings. Azure Private Link allows for enhanced inbound security through private endpoints, while an Azure VNet gateway allows for enhanced outbound security when connecting to data sources. Azure VNet gateway is Microsoft-managed rather than customer-managed, so it eliminates the overhead of installing and monitoring on-premises gateways.

Some of your organizational-level decisions will result in firm governance policies, particularly when they relate to compliance. Other organizational-level decisions might result in guidance that you can provide to content creators who are responsible for managing and securing their own content. The resulting policies and guidelines should be included in your centralized portal, training materials, and communication plan.

Tip

See the other articles in this series for additional suggestions that relate to security planning for report consumers and content creators.

Checklist - When planning your high-level security strategies, key decisions and actions include:

  • Identify regulatory requirements related to security: Investigate and document each requirement, including how you'll ensure compliance.
  • Identify high-level security strategies: Determine which security requirements are important enough that they should be included in a governance policy.
  • Collaborate with other administrators: Contact the relevant system administrator(s) to discuss how to meet security requirements and what technical prerequisites exist. Plan for doing a technical proof of concept.
  • Update Power BI tenant settings: Set up each relevant Power BI tenant setting. Schedule follow-up reviews regularly.
  • Create and publish user guidance: Create documentation for the high-level security strategies. Include details about the process and how a user can request an exemption from the standard process. Make this information available in your centralized portal and training materials.
  • Update training materials: For the high-level security strategies, determine which requirements or guidelines you should include in user training materials.

Integration with Microsoft Entra ID

Power BI security is built upon the foundation of a Microsoft Entra tenant. The following Microsoft Entra concepts are relevant to the security of a Power BI tenant.

  • User access: Access to the Power BI service requires a user account (in addition to a Power BI license: Free, Power BI Pro, or Premium Per User - PPU). You can add both internal users and guest users to Microsoft Entra ID, or they can be synchronized with an on-premises Active Directory (AD). For more information about guest users, see Strategy for external users.
  • Security groups: Microsoft Entra security groups are required when making certain features available in the Power BI tenant settings. You might also need groups to effectively secure Power BI workspace content or for distributing content. For more information, see Strategy for using groups.
  • Conditional access policies: You can set up conditional access to the Power BI service and the Power BI mobile app. Microsoft Entra conditional access can restrict authentication in various situations. For example, you could enforce policies that:
    • Require multifactor authentication for some or all users.
    • Allow only devices that comply with organizational policies.
    • Allow connectivity from a specific network or IP range(s).
    • Block connectivity from a non-domain-joined machine.
    • Block connectivity for a risky sign-on.
    • Allow only certain types of devices to connect.
    • Conditionally allow or deny access to Power BI for specific users.
  • Service principals: You might need to create a Microsoft Entra app registration to provision a service principal. Service principal authentication is a recommended practice when a Power BI administrator wants to run unattended, scheduled, scripts that extract data by using the Power BI admin APIs. Service principals are also useful when embedding Power BI content in a custom application.
  • Real-time policies: You can choose to set up real-time session control or access control policies, which involves both Microsoft Entra ID and Microsoft Defender for Cloud Apps. For example, you can prohibit the download of a report in the Power BI service when it has a specific sensitivity label. For more information, see the information protection and data loss prevention articles.

It might be difficult to find the right balance between unrestricted access and overly restrictive access (which frustrates users). The best strategy is to work with your Microsoft Entra administrator to understand what's currently set up. Try to remain responsive to the needs of the business while being mindful of necessary restrictions.

Tip

Many organizations have an on-premises Active Directory (AD) environment that they synchronize with Microsoft Entra ID in the cloud. This setup is known as a hybrid identity solution, which is out of scope for this article. The important concept to understand is that users, groups, and service principals must exist in Microsoft Entra ID for cloud-based services like Power BI to work. Having a hybrid identity solution will work for Power BI. We recommend talking to your Microsoft Entra administrators about the best solution for your organization.

Checklist - When identifying needs for Microsoft Entra integration, key decisions and actions include:

  • Work with Microsoft Entra administrators: Collaborate with your Microsoft Entra administrators to find out what existing Microsoft Entra policies are in place. Determine whether there are any policies (current or planned) that'll affect the user experience in the Power BI service and/or in the Power BI mobile applications.
  • Decide when user access versus service principal should be used: For automated operations, decide when to use a service principal instead of user access.
  • Create or update user guidance: Determine whether there are security topics that you'll need to document for the Power BI user community. That way, they'll know what to expect for using groups and conditional access policies.

Strategy for external users

Power BI supports Microsoft Entra Business-to-Business (B2B). External users, for instance from a customer or partner company, can be invited as guest users in Microsoft Entra ID for collaboration purposes. External users can work with Power BI and many other Azure and Microsoft 365 services.

Important

The Microsoft Entra B2B white paper is the best resource for learning about strategies for handling external users. This article is limited to describing the most important considerations that are relevant to planning.

There are advantages when an external user is from another organization that also has Microsoft Entra ID set up.

  • Home tenant manages the credentials: The user's home tenant stays in control of their identity and management of credentials. You don't need to synchronize identities.
  • Home tenant manages the user's status: When a user leaves that organization and the account is removed or disabled, with immediate effect, the user will no longer have access to your Power BI content. It's a significant advantage because you might not know when someone has left their organization.
  • Flexibility for user licensing: There are cost-effective licensing options. An external user may already have a Power BI Pro or PPU license, in which case you don't need to assign one to them. It's also possible to grant them access to content in a Premium capacity or Fabric F64 or greater capacity workspace by assigning a Fabric (free) license to them.

Important

At times this article refers to Power BI Premium or its capacity subscriptions (P SKUs). Be aware that Microsoft is currently consolidating purchase options and retiring the Power BI Premium per capacity SKUs. New and existing customers should consider purchasing Fabric capacity subscriptions (F SKUs) instead.

For more information, see Important update coming to Power BI Premium licensing and Power BI Premium FAQ.

Key settings

There are two aspects to enabling and managing how external user access will work:

  • Microsoft Entra settings that are managed by a Microsoft Entra administrator. These Microsoft Entra settings are a prerequisite.
  • Power BI tenant settings that are managed by a Power BI administrator in the admin portal. These settings will control the user experience in the Power BI service.

Guest invitation process

There are two ways to invite guest users to your tenant.

  • Planned invitations: You can set up external users ahead of time in Microsoft Entra ID. That way, the guest account is ready whenever a Power BI user needs to use it for assigning permissions (for example, app permissions). Although it requires some up-front planning, it's the most consistent process because all Power BI security capabilities are supported. An administrator can use PowerShell to efficiently add a large number of external users.
  • Ad hoc invitations: A guest account can be automatically generated in Microsoft Entra ID at the time that a Power BI user shares or distributes content to an external user (who wasn't previously set up). This approach is useful when you don't know ahead of time who the external users will be. However, this capability must first be enabled in Microsoft Entra ID. The ad hoc invitation approach works for ad hoc per-item permissions and app permissions.

Tip

Not every security option in the Power BI service supports triggering an ad hoc invitation. For this reason, there's an inconsistent user experience when assigning permissions (for example workspace security versus per-item permissions versus app permissions). Whenever possible, we recommend that you use the planned invitation approach because it results in a consistent user experience.

Customer tenant ID

Every Microsoft Entra tenant has a globally unique identifier (GUID) known as the tenant ID. In Power BI, it's known as the customer tenant ID (CTID). The CTID allows the Power BI service to locate content from the perspective of a different organizational tenant. You need to append the CTID to URLs when sharing content with an external user.

Here's an example of appending the CTID to a URL: https://app.powerbi.com/Redirect?action=OpenApp&appId=abc123&ctid=def456

When you need to provide the CTID for your organization to an external user, you can find it in the Power BI service by opening the About Power BI dialog window. It's available from the Help & Support (?) menu located at the top-right of the Power BI service. The CTID is appended to the end of the tenant URL.

Screenshot of the About Power BI dialog window with the customer tenant ID highlighted.

Organizational branding

When external guest access happens frequently in your organization, it's a good idea to use custom branding. It helps users identify which organizational tenant they're accessing. Custom branding elements include a logo, cover image, and theme color.

The following screenshot shows what the Power BI service looks like when accessed by a guest account. It includes a Guest content option, which is available when the CTID is appended to the URL.

Screenshot of the Power BI service with the Guest content option highlighted.

External data sharing

Some organizations have a requirement to do more than share reports with external users. They intend to share semantic models with external users, such as partners, customers, or vendors.

The goal for in-place semantic model sharing (also known as cross-tenant semantic model sharing) is to allow external users to create their own customized reports and composite models by using data you create, manage, and provide. The original shared semantic model (created by you) remains in your Power BI tenant. The dependent reports and models are stored in the external user's Power BI tenant.

There are several security aspects for making in-place semantic model sharing work.

  • Tenant setting: Allow guest users to work with shared semantic models in their own tenants: This setting specifies whether the external data sharing feature can be used. It needs to be enabled for either of the other two settings (shown next) to take effect. It's enabled or disabled for the entire organization by the Power BI administrator.
  • Tenant setting: Allow specific users to turn on external data sharing: This setting specifies which groups of users can share data externally. The groups of users permitted here will be allowed to use the third setting (described next). This setting is managed by the Power BI administrator.
  • Semantic model setting: External sharing: This setting specifies whether that specific semantic model can be used by external users. This setting is managed by content creators and owners for each specific semantic model.
  • Semantic model permission: Read and Build: The standard semantic model permissions to support content creators are still in place.

Important

Typically, the term consumer is used to refer to view-only users who consume content that's produced by others in the organization. However, with in-place semantic model sharing, there's a producer of the semantic model and a consumer of the semantic model. In this situation, the consumer of the semantic model is usually a content creator in the other organization.

If row-level security is specified for your semantic model, it's honored for external users. For more information, see the Enforce data security based on consumer identity section in the Report consumer security planning article.

External user subscriptions

It's most common for external users to be managed as guest users in Microsoft Entra ID, as previously described. In addition to this common approach, Power BI provides other capabilities for distributing report subscriptions to users outside the organization.

The Power BI Allow email subscriptions to be sent to external users tenant setting specifies whether users are permitted to send email subscriptions to external users who aren't yet Microsoft Entra guest users. We recommend that you set this tenant setting to align with how strictly, or flexibly, your organization prefers to manage external user accounts.

Tip

Administrators can verify which external users are being sent subscriptions by using the Get Report Subscriptions as Admin API. The email address for the external user is shown. The principal type is unresolved because the external user isn't set up in Microsoft Entra ID.

Checklist - When planning for how to handle external guest users, key decisions and actions include:

  • Identify requirements for external users in Power BI: Determine what use cases there are for external collaboration. Clarify the scenarios for using Power BI with Microsoft Entra B2B. Determine whether collaboration with external users is a common or rare occurrence.
  • Determine the current Microsoft Entra settings: Collaborate with your Microsoft Entra administrator to find out how external collaboration is currently set up. Determine what the impact will be on using B2B with Power BI.
  • Decide how to invite external users: Collaborate with your Microsoft Entra administrators to decide how guest accounts will be created in Microsoft Entra ID. Decide whether ad hoc invitations will be allowed. Decide to what extent the planned invitation approach will be used. Ensure that the entire process is understood and documented.
  • Create and publish user guidance about external users: Create documentation for your content creators that will guide them on how to share content with external users (particularly when the planned invitation process is required). Include information about limitations that external users will face if they intend to have external users edit and manage content. Publish this information to your centralized portal and training materials.
  • Determine how to handle external data sharing: Decide whether external data sharing should be allowed, and whether it's limited to a specific set of approved content creators. Set the Allow guest users to work with shared semantic models in their own tenants tenant setting and the Allow specific users to turn on external data sharing tenant setting to align with your decision. Provide information about external data sharing for your semantic model creators. Publish this information to your centralized portal and training materials.
  • Determine how to handle Power BI licenses for external users: If the guest user doesn't have an existing Power BI license, decide on the process to assign them a license. Ensure that the process is documented.
  • Include your CTID in relevant user documentation: Record the URL that appends the tenant ID (CTID) in user documentation. Include examples for creators and consumers on how to use URLs that append the CTID.
  • Set up custom branding in Power BI: In the admin portal, set up custom branding to help external users identify which organizational tenant they're accessing.
  • Verify or update tenant settings: Check how the tenant settings are currently set up in the Power BI service. Update them as necessary based on the decisions made for managing external user access.

Strategy for file locations

There are different types of files that should be appropriately stored. So, it's important to help users understand expectations for where files and data should be located.

There can be risk associated with Power BI Desktop files and Excel workbooks because they can contain imported data. This data could include customer information, personally identifiable information (PII), proprietary information, or data that's subject to regulatory or compliance requirements.

Tip

It's easy to overlook the files that are stored outside of the Power BI service. We recommend that you consider them when you're planning for security.

Here are some of the types of files that might be involved in a Power BI implementation.

  • Source files
    • Power BI Desktop files: The original files (.pbix) for content that's published to the Power BI service. When the file contains a data model, it might contain imported data.
    • Excel workbooks: Excel workbooks (.xlsx) might include connections to semantic models in the Power BI service. They might also contain exported data. They might even be original workbooks for content that's published to the Power BI service (as a workbook item in a workspace).
    • Paginated report files: The original report files (.rdl) files for content that's published to the Power BI service.
    • Source data files: Flat files (for example, .csv or .txt) or Excel workbooks that contain source data that's been imported into a Power BI model.
  • Exported and other files
    • Power BI Desktop files: The .pbix files that have been downloaded from the Power BI service.
    • PowerPoint and PDF files: The PowerPoint presentations (.pptx) and PDF documents downloaded from the Power BI service.
    • Excel and CSV files: Data exported from reports in the Power BI service.
    • Paginated report files: The files exported from paginated reports in the Power BI service. Excel, PDF, and PowerPoint are supported. Other export file formats exist for paginated reports as well, including Word, XML, or web archive. When using the export files to reports API, image formats are also supported.
    • Email files: Email images and attachments from subscriptions.

You'll need to make some decisions about where users can or can't store files. Typically, that process involves creating a governance policy that users can refer to. The locations for source files and exported files should be secured to ensure appropriate access by authorized users.

Here are some recommendations for working with files.

  • Store files in a shared library: Use a Teams site, a SharePoint library, or a OneDrive for work or school shared library. Avoid using personal libraries and drives. Ensure that the storage location is backed up. Also ensure that the storage location has versioning enabled so that it's possible to roll back to a previous version.
  • Use the Power BI service as much as possible: Whenever possible, use the Power BI service for sharing and distribution of content. That way, there's full auditing of access always. Storing and sharing files on a file system should be reserved for the small number of users who are collaborating on content.
  • Don't use email: Discourage the use of email for sharing files. When someone emails an Excel workbook or a Power BI Desktop file to 10 users, it results in 10 copies of the file. There's always the risk of including an incorrect (internal or external) email address. Also, there's a greater risk the file will be forwarded to someone else. (To minimize this risk, work with your Exchange Online administrator to implement rules to block attachments based on conditions of size or type of file extension. Other data loss prevention strategies for Power BI are described in the information protection and data loss prevention articles.)
  • Use template files: Occasionally, there's a legitimate need to share a Power BI Desktop file with someone else. In this case, consider creating and sharing a Power BI Desktop template (.pbit) file. A template file only contains metadata, so it's smaller in size than the source file. This technique will require the recipient to input data source credentials to refresh the model data.

There are tenant settings in the admin portal that control which export formats users are permitted to use when exporting from the Power BI service. It's important to review and set these settings. It's a complementary activity to planning for the file locations that should be used for the exported files.

Tip

Certain export formats support end-to-end information protection by using encryption. Due to regulatory requirements, some organizations have a valid need to restrict which export formats users can use. The Information protection for Power BI article describes factors to consider when deciding which export formats to enable or disable in the tenant settings. In most cases, we recommend that you restrict exporting capabilities only when you must meet specific regulatory requirements. You can use the Power BI activity log to identify which users are performing many exports. You can then teach these users about more efficient and secure alternatives.

Checklist - When planning for file locations, the key decisions and actions include:

  • Identify where files should be located: Decide where files should be stored. Determine whether there are specific locations that shouldn't be used.
  • Create and publish documentation about file locations: Create user documentation that clarifies the responsibilities for managing and securing files. It should also describe any locations where files should (or shouldn't) be stored. Publish this information to your centralized portal and training materials.
  • Set the tenant settings for exports: Review and set each tenant setting related to export formats you want to support.

Strategy for using groups

We recommend using Microsoft Entra security groups to secure Power BI content for the following reasons.

  • Reduced maintenance: The security group membership can be modified without the need to modify the permissions for the Power BI content. New users can be added to the group, and unnecessary users can be removed from the group.
  • Improved accuracy: Because the group membership changes are made once, it results in more accurate permission assignments. If an error is detected, it can be more easily corrected.
  • Delegation: You can delegate the responsibility of managing group membership to the group owner.

High-level group decisions

There are some strategic decisions to be made regarding how groups will be used.

Permission to create and manage groups

There are two key decisions to make about creating and managing groups.

  • Who's allowed to create a group? Commonly, only IT can create security groups. However, it's possible to add users to the built-in Groups administrator Microsoft Entra role. That way, certain trusted users, like Power BI champions or satellite members of your COE, can create groups for their business unit.
  • Who's allowed to manage members of a group? It's common that IT manages group membership. However, it's possible to specify one or more group owners who are permitted to add and remove group members. Using self-service group management is helpful when a decentralized team or satellite members of the COE are permitted to manage the membership of Power BI-specific groups.

Tip

Allowing self-service group management and specifying decentralized group owners are great ways to balance efficiency and speed with governance.

Planning for Power BI groups

It's important that you create a high-level strategy for how to use groups for securing Power BI content and many other uses.

Various use cases for groups

Consider the following use cases for groups.

Use case Description Example group name
Communicating with the Power BI Center of Excellence (COE) Includes all users associated with the COE, including all core and satellite members of the COE. Depending on your needs, you might also create a separate group for only the core members. It's likely to be a Microsoft 365 group that's correlated with a Teams site. • Power BI Center of Excellence
Communicating with the Power BI leadership team Includes the executive sponsor and representatives from business units who collaborate on leading the Power BI initiative in the organization. • Power BI steering committee
Communicating with the Power BI user community Includes all users who are assigned any type of Power BI user license. It's useful for making announcements to all Power BI users in your organization. It's likely to be a Microsoft 365 group that's correlated with a Teams site. • Power BI community
Supporting the Power BI user community Includes help desk users who directly interact with the user community to handle Power BI support issues. This email address (and Teams site, if applicable) is available and visible to the user population. • Power BI user support
Providing escalated support Includes specific users, usually from the Power BI COE, who provide escalated support. This email address (and Teams site, if applicable) is typically private, for use only by the user support team. • Power BI escalated user support
Administering the Power BI service Includes specific users who are allowed to administer the Power BI service. Optionally, members of this group can be correlated to the role in Microsoft 365 to simplify management. • Power BI administrators
Notifying allowed features and gradual roll outs of features Includes users allowed for a specific tenant setting in the admin portal (if the feature will be limited), or if the feature is to be rolled out gradually to groups of users. Many of the tenant settings will require you to create a new Power BI-specific group. • Power BI workspace creators

• Power BI external data sharing
Managing data gateways Includes one or more groups of users who are allowed to administer a gateway cluster. There might be several groups of this type when there are multiple gateways or when decentralized teams manage gateways. • Power BI gateway administrators

• Power BI gateway data source creators

• Power BI gateway data source owners

• Power BI gateway data source users
Managing Premium capacities Includes users allowed to manage a Premium capacity. There might be several groups of this type when there are multiple capacities or when decentralized teams manage capacities. • Power BI capacity contributors
Securing workspaces, apps, and items Many groups that are based on subject areas and allowed access for managing security of Power BI workspace roles, app permissions, and per-item permissions. • Power BI workspace administrators

• Power BI workspace members

• Power BI workspace contributors

• Power BI workspace viewers

• Power BI app viewers
Deploying content Includes the users that can deploy content by using a Power BI deployment pipeline. This group is used in conjunction with workspace permissions. • Power BI deployment pipeline administrators
Automating administrative operations Includes the service principals that are allowed to use Power BI APIs for embedding or administrative purposes. • Power BI service principals

Groups for Power BI tenant settings

Depending on the internal processes you have in place, you'll have other groups that are necessary. Those groups are helpful when managing the tenant settings. Here are some examples.

  • Power BI workspace creators: Useful when you need to limit who can create workspaces. It's used to set up the Create workspaces tenant setting.
  • Power BI certification subject matter experts: Useful to specify who's permitted to use the certified endorsement for content. It's used to set up the Certification tenant setting.
  • Power BI approved content creators: Useful when you require approval, or training, or a policy acknowledgment for installation of Power BI Desktop, or for obtaining a Power BI Pro or PPU license. It's used by tenant settings that encourage content creation capabilities, such as Allow DirectQuery connections to Power BI semantic models, Push apps to end users, Allow XMLA endpoints, and others.
  • Power BI external tool users: Useful when you allow the use of external tools for a selective group of users. It's used by group policy, or when software installations or requests must be carefully controlled.
  • Power BI custom developers: Useful when you need to control who's permitted to embed content in other applications outside of Power BI. It's used to set up the Embed content in apps tenant setting.
  • Power BI public publishing: Useful when you need to limit who can publish data publicly. It's used to set up the Publish to web tenant setting.
  • Power BI share to entire organization: Useful when you need to restrict who can share a link with everyone in the organization. It's used to set up the Allow shareable links to grant access to everyone in your organization tenant setting.
  • Power BI external data sharing: Useful when you need to allow certain users to share semantic models with external users. It's used to set up the Allow specific users to turn on external data sharing tenant setting.
  • Power BI guest user access licensed: Useful when you need to group approved external users who are granted a license by your organization. It's used to set up the Allow Microsoft Entra guest users access to Power BI tenant setting.
  • Power BI guest user access BYOL: Useful when you need to group approved external users who bring their own license (BYOL) from their home organization. It's used to set up the Allow Microsoft Entra guest users access to Power BI tenant setting.

Tip

For considerations about using groups when planning for workspace access, see the Workspace-level planning article. For information about planning for securing workspaces, apps, and items, see the Report consumer security planning article.

Type of group

You can create different types of groups.

  • Security group: A security group is the best choice when your primary goal is to grant access to a resource.
  • Mail-enabled security group: When you need to grant access to a resource and distribute messages to the entire group by email, a mail-enabled security group is a good choice.
  • Microsoft 365 group: This type of group has a Teams site and an email address. It's the best choice when the primary goal is communication or collaboration in a Teams site. A Microsoft 365 group only has members and owners; there isn't a viewer role. For this reason, its primary purpose is collaboration. This type of group was formerly known as an Office 365 group, modern group, or unified group.
  • Distribution group: You can use a distribution group to send a broadcast notification to a list of users. Today, it's considered to be a legacy concept that provides backwards compatibility. For new use cases, we recommend that you create a mail-enabled security group instead.

When you request a new group, or you intend to use an existing group, it's important to be aware of its type. The type of group can determine how it's used and managed.

  • Power BI permissions: Not every type of group is supported for every type of security operation. Security groups (including mail-enabled security groups) offer the highest coverage when it comes to setting Power BI security options. Microsoft documentation generally recommends Microsoft 365 groups. However, in the case of Power BI, they aren't as capable as security groups. For more information about Power BI permissions, see the later articles in this series on security planning.
  • Power BI tenant settings: You can only use security groups (including mail-enabled security groups) when allowing or disallowing groups of users to work with Power BI tenant settings.
  • Advanced Microsoft Entra features: Certain types of advanced features aren't supported for all group types. For example, Microsoft 365 groups don't support nesting of groups within a group. Although some group types support dynamic group membership based on user attributes in Microsoft Entra ID, groups that use dynamic membership aren't supported for Power BI.
  • Managed differently: Your request to create or manage a group might be routed to a different administrator based on the type of group (mail-enabled security groups and distribution groups are managed in Exchange). Therefore, your internal process will differ depending on the type of group.

Group naming convention

It's likely that you'll end up with many groups in Microsoft Entra ID to support your Power BI implementation. Therefore, it's important to have an agreed-upon pattern for how groups are named. A good naming convention will help to determine the purpose of the group and make it simpler to manage.

Consider using the following standard naming convention: <Prefix> <Purpose> - <Topic/Scope/Department> <[Environment]>

The following list describes each part of the naming convention.

  • Prefix: Used to group all Power BI groups together. When the group will be used for more than one analytical tool, your prefix might be just BI, rather than Power BI. In that case, the text that describes the purpose will be more generic so that it relates to more than one analytical tool.
  • Purpose: The purpose will vary. It could be for a workspace role, app permissions, item-level permissions, row-level security, or other purpose. Sometimes multiple purposes can be satisfied with a single group.
  • Topic/Scope/Department: Used to clarify who the group applies to. It will often describe the group membership. It can also refer to who manages the group. Sometimes a single group can be used for multiple purposes. For example, a collection of finance workspaces could be managed with a single group.
  • Environment: Optional. Useful to differentiate between development, test, and production.

Here are some example group names that apply the standard naming convention.

  • Power BI workspace admins - Finance [Dev]
  • Power BI workspace members - Finance [Dev]
  • Power BI workspace contributors - Finance [Dev]
  • Power BI workspace viewers - Finance [Dev]
  • Power BI app viewers - Finance
  • Power BI gateway administrators - Enterprise BI
  • Power BI gateway administrators - Finance

Decisions per group

When planning for which groups you'll need, several decisions must be made.

When a content creator or owner requests a new group, ideally they use a form to provide the following information.

  • Name and purpose: A suggested group name and its intended purpose. Consider including Power BI (or just BI when you have multiple BI tools) in the group name to clearly indicate the scope of the group.
  • Email address: An email address when communication is also required for the group members. Not all types of groups need to be mail-enabled.
  • Type of group: Options include security group, mail-enabled security group, Microsoft 365 group, and distribution group.
  • Group owner: Who's allowed to own and manage the members of the group.
  • Group membership: The intended users who will be members of the group. Consider whether external users and internal users can be added, or whether there's a justification for putting external users into a different group.
  • Use of just-in-time group member assignment: You can use Privileged Identity Management (PIM) to allow time-boxed, just-in-time, access to a group. This service can be helpful when users require temporary access. PIM is also helpful for Power BI administrators who need occasional access.

Tip

Existing groups that are based on the organizational chart don't always work well for Power BI purposes. Use existing groups when they meet your needs. However, be prepared to create Power BI-specific groups when the need arises.

Checklist - When creating your strategy for how to use groups, key decisions and actions include:

  • Decide on the strategy for the use of groups: Determine the use cases and purposes you'll need to use groups. Be specific about when security should be applied by using user accounts versus when a group is required or preferred.
  • Create a naming convention for Power BI-specific groups: Ensure that a consistent naming convention is in use for groups that will support Power BI communication, features, administration, or security.
  • Decide who is allowed to create groups: Clarify whether all group creation is required to go through IT. Or whether certain individuals (like satellite members of the COE) can be granted permission to create groups for their business unit.
  • Create a process for how to request a new group: Create a form for users to request the creation of a new group. Ensure that there's a process in place to respond quickly to new requests. Bear in mind that if requests are delayed, users might be tempted to start assigning permissions to individuals accounts.
  • Decide when decentralized group management is allowed: For groups that apply to a specific team, decide when it's acceptable for a group owner (outside of IT) to manage members in the group.
  • Decide whether just-in-time group membership will be used: Determine whether Privileged Identity Management will be useful. If so, determine which groups it can be used for (such as the Power BI administrator group).
  • Review which groups currently exist: Determine which existing groups can be used, and which groups need to be created.
  • Review each tenant setting: For each tenant setting, determine whether it'll be allowed or disallowed for a specific set of users. Determine whether a new group needs to be created to set up the tenant setting.
  • Create and publish guidance for users about groups: Include documentation for content creators that includes requirements, or preferences, for using groups. Ensure that they know what to ask for when they request a new group. Publish this information to your centralized portal and training materials.

In the next article in this series, learn about ways to securely deliver content to read-only report consumers.