Adding a Power BI Online (V2) Connection
Prerequisites
Supported Versions
The Power BI Online (V2) connector is compatible with the product online version.
Installing the Plugin
ATTENTION: Migrating from PowerBI (V1) connector to PowerBI (V2) connector requires specific operations. Please contact customer service to assist you in this migration.
Declaring the Connection
Creating and configuring connectors is done through a dedicated configuration file located in the /connections folder of the relevant scanner. The scanner frequently checks for any change and resynchronises automatically.
In order to establish a connection with a PowerBI Online instance, specifying the following parameters in the dedicated file is required:
Parameter | Expected value |
|---|
name | The name that will be displayed to catalog users for this connection. |
code | The unique identifier of the connection on the Zeenea platform. Once registered on the platform, this code must not be modified or the connection will be considered as new and the old one removed from the scanner. |
connector_id | The connector type to use for the connection. Here, the value must be powerbi and this value must not be modified. |
connection.tenant | Tenant's technical identifier |
connection.url | Connection address. Default value https://api.powerbi.com. |
connection.oauth.client_id | Application ID (client) as defined in Azure |
connection.oauth.client_secret | Client secret |
connection.oauth.endpoint | API Scanner endpoint. Must respect following format: https://login.microsoftonline.com/<tenants-technical-identifier>/oauth2/v2.0/token |
dsn.configuration | To define the list of DSNs configured in PowerBI Desktop. Must be filled in to get the lineage to external sources from DSNs. See the template to complete the field. |
cache.enabled | Enable cache usage (default value is false) |
cache.path | (Optional) To customize the cache disk storage path. Default value is the scanner cache folder. |
proxy.scheme | Depending on the proxy, http or https |
proxy.hostname | Proxy address |
proxy.port | Proxy port |
proxy.username | Proxy username |
proxy.password | Proxy account password |
contact.role_filter | Enables you to extract only the contacts that do have a role matching the filter. To achieve this, use the role key to filter the contacts. Example: contact.role_filter = "role in ('Owner', 'Read')" |
filters | Universal filters. Refer to Universal Filters below. |
User Permissions
In order to collect metadata, the running user's permissions must allow them to access and read reports that need cataloging. A Service Principal account is needed to authenticate to MS Azure via a registered application using OAuth 2.0, an application ID, and a secret key.
To create a service principal in Azure, you will first need to register an application in Azure Active Directory (Azure AD). This application registration will automatically create a corresponding service principal, which represents the application's identity in your Microsoft Entra tenant. You'll need to note the Application (client) ID and the Client Secret from the app registration, which will be needed for the Zeenea Scanner configuration. Finally, you'll need to grant the service principal the necessary roles and permissions to access the resources it needs.
Access to the PowerBI Admin API must be enabled for service principals using the Microsoft Fabric Admin Portal or Power BI Admin Portal and linked to a security group created using the Microsoft Entra Admin Center
To configure Admin API settings in Azure, you typically need to enable service principal authentication for admin APIs within the Admin portal, especially when using features like Microsoft Fabric. This involves signing into the Microsoft Fabric Admin Portal, navigating to tenant settings, and enabling the switch for service principal access to read-only admin APIs. You also need to assign a specific security group created during application creation to the Admin API settings.
Detailed PowerBI Setup
Register an Application in Azure Entra ID (fka Active Directory):
Log in to the Azure portal.
Go to Azure Entra ID.
Select App registrations.
Click New registration.
Enter a name for your application.
Choose the appropriate supported account types.
Select the redirect URI.
Click Register.
Note the Application (client) ID:
Add a Client Secret:
You can add a client secret to provide a password-based credential for authentication.
Go to Certificates & secrets under the app registration.
Click New client secret.
Enter a description and expiry date, then click Add.
Important: Copy the value of the client secret immediately after creation, as you won't be able to retrieve it later.
Grant Permissions:
Go to the Azure resource you want the service principal to access.
Select Access control (IAM).
Click Add role assignment.
Choose the appropriate privileged administrator role (for example, "Contributor").
Add members by selecting the service principal created by the registered application.
Click Save.
Create Security Group using the Microsoft Entra Admin Center:
Sign in to the Microsoft Entra admin center. Access the Entra admin center with appropriate permissions (at least a Groups Administrator role).
Navigate to Groups: Go to Identity > Groups > ALL groups.
Create a new group: Click on New group.
Provide Group Details:
Group type: Select Security.
Group name: Enter a descriptive name for the group.
Description: (Optional) Add a description for the group.
Membership type: Choose Assigned for manually assigned members or Dynamic for automatically managed members based on rules.
Choose Create: Select Create to finalize the group creation.
Add previously created service principal to the security group as a direct member.
Configure Admin API Settings:
Access the Admin Portal: Navigate to the Admin portal within your Azure subscription.
Navigate to Tenant Settings:
Locate Developer Settings:
Enable Service Principal Authentication:
Locate Admin API Settings:
Enable Service Principal Authentication:
Enable the switch that allows service principals to access read-only Admin APIs.
Enable the switch that allows service principals to access read-only Admin APIs used for updates
Enable the switch that allows for enhanced Admin API responses with detailed metadata.
Give permission to PowerBI Workspaces:
Access PowerBI Online Application.
Navigate to Workspaces section.
Grant the Member permission set to the service principal for every Workspace that you want to catalog.
Note: Do not grant the Member permission set to a security group; otherwise, it will not work correctly.
Rich Filters
Filter and extract only the contacts that do have a role matching the filter.
Criteria | Description |
|---|
role | The role name to filter. The values list is available here. |
Example:
contact.role_filter = "role in ('Owner', 'Read')"
Universal Filters
Use universal filter language to filter and root items with the criteria bellow
Criteria | Description |
|---|
workspace_id | (UUID) PowerBI Workspace |
type | (String Enum) Object type (dataset/report) |
id | (UUID) PowerBI Report |
dataset_name | (String) Name of table in semantic model |
semantic_model_name | (String) Semantic Model Name |
workspace_name | (String) Workspace Name |
name | (String) Report Name |
Example:
filters = [
{
id = "accept_zeenea_workspace"
action = ACCEPT
catalog = "Zeenea Catalog"
rules {
workspace_name = "Zeenea"
}
},
{
id = "default_reject"
action = REJECT
}
]
Data Extraction
To extract information, the connector runs successively the following API requests:
GET https://api.powerbi.com/v1.0/myorg/admin/workspaces/modified:
POST https://api.powerbi.com/v1.0/myorg/admin/workspaces/getInfo:
GET https://api.powerbi.com/v1.0/myorg/admin/workspaces/scanStatus/:
Parameter: Scan identifier
Response: Scan status: NOT_STARTED, RUNNING, SUCCEEDED
GET https://api.powerbi.com/v1.0/myorg/admin/workspaces/scanResult/:
GET https://api.powerbi.com/v1.0/myorg/admin/apps:
GET https://api.powerbi.com/v1.0/myorg/groups/<workspace_id>/reports/<report_id>/pages:
GET https://api.powerbi.com/v1.0/myorg/groups/<workspace_id>/reports/<report_id>/export:
Collected Metadata
Inventory
Collects the list of reports accessible by the user.
Lineage
The Power BI Online (V2) connector is able to retrieve the lineage between datasets that have been imported to the catalog. Datasets from other connections must have been previously imported to the catalog to be linked to the Power BI Online (V2) dataset through a new Data Process object. This feature is available for the following systems and, for it to work, an additional parameter is needed in the configuration file of the source system connection as configured in the Power BI Online (V2) connection configuration panel. For example, if the Power BI dataset comes from a SQL Server table, then a new alias parameter must be added in the SQL Server connection configuration file.
The following table summarizes the possible values of the alias parameter to be completed in the data source configuration file.
Source System | Model | Example |
|---|
| Server name:port/Database name | alias = ["zeenea.database.windows.net:1433/db"] * |
| BigQuery project identifier | alias = ["zeenea-project"] |
| Server name:port/Database name | alias = ["zeenea.cthwlv3ueke2.eu-west-3.redshift.amazonaws.com:5439/database"] |
| Server name/Database name | alias = ["kn999999.eu-west-1.snowflakecomputing.com/ZEENEA""] * |
| Server name:port/Service Name | alias = ["oracle.example.com:1521/XE"] |
| Server name:ODBC port | alias = ["denodo.database.com:9996"] |
Note: The connector creates a data process object for each dataset from Power BI Online (V2) to represent the link with the source dataset (even if the source dataset is not present in the catalog).
Visualization
A visualization object is a Power BI report.
Name
Source Description
Contacts
Technical Data:
Dataset
A dataset is a table inside a PowerBI semantic model.
Name
Source Description
Technical Data:
PowerBI Dataset: Name of the PowerBI dataset
Workspace: Link to PowerBI workspace
Semantic Model: Link to PowerBI semantic model
Power Query
Field
Dataset field or measure.
Name
Source Description
Type
Can be null: Not supported. Default value false.
Multivalued: Not supported. Default value false.
Primary Key: Not supported. Default value false.
Technical Data:
Technical Name
Native type
Type
Expression
Data Process
To represent the data flow from an external source, a Zeenea Data Process will be created for each Power BI Online Dataset.
Object Identification Keys
An identification key is associated with each object in the catalog. In the case of the object being created by a connector, the connector builds it.
Object | Identification Key | Description |
|---|
Visualization | code/workspace_id/report/report_id | - code: Unique identifier of the connection noted in the configuration file - workspace_id: Power BI Online workspace technical identifier - report_id: Power BI report technical identifier |
Dataset | code/workspace_id/dataset/dataset_id/dataset_name | - code: Unique identifier of the connection noted in the configuration file - workspace_id: Power BI Online Group technical identifier - dataset_id: Power BI technical semantic model technical identifier - dataset_name: Power BI table name from semantic model |
Field | code/workspace_id/report/report_id/dataset/field_name code/workspace_id/dataset/dataset_id/dataset_name/field_name | - code: Unique identifier of the connection noted in the configuration file - workspace_id: Power BI Online Group technical identifier - dataset_id: Power BI semantic model technical identifier - dataset_name: Power BI technical table name from semantic model - field_name: PowerBI field technical name |
Data process | code/workspace_id/report/report_id/dataset/process code/workspace_id/dataset/dataset_id/dataset_name/process | - code: Unique identifier of the connection noted in the configuration file - workspace_id: Power BI Online Group technical identifier - report_id: Power BI report technical identifier - dataset_id: Power BI technical semantic model technical identifier - dataset_name: Power BI table name from semantic model |
Last modified date: 11/28/2025