Register an Application in Microsoft Entra and Configure Permissions #
- Sign in to the Azure portal.
- Select your Microsoft Entra tenant by selecting your account in the upper-right corner of the page.
- Select App registrations. If you don’t see this option, search for it.
- In App registrations, select New registration.
Fill in the following fields:
- Name – Give your application a name.
- Supported account type – Select who can use the application. Select Accounts in this organizational directory only for single tenant apps, or Accounts in any organizational directory for cross-tenant scenarios.
(Optional) In the Redirect URI box, add a redirect URL.
- Select Register. After your app is registered, you’re directed to your app’s overview page, where you can obtain the Application ID. Copy and save the Application ID and all information in the Summary box for later use.
Create a Client Secret #
- In your newly created app registration, go to Certificates & secrets under the Manage section.
- Select New client secret.
- Provide a name and set an expiration date.
- After saving, copy and store the secret value and secret ID securely. These values cannot be retrieved again later.
- It is recommended to store them in Azure Key Vault.
- The secret value will be required in later steps.
Add the App Registration to a Security Group #
- In the Azure portal, search for Microsoft Entra ID using the search bar.
- In the left-hand menu, select Groups.
12. If you do not already have a suitable security group:
- Select New group.
- Set the Group type to Security.
- Provide a name and description for the group.
- Assign an owner.
- Add your app registration as a member.
If you already have an existing security group:
- Search for the specific group by name.
- Open the group and add the app registration as a member.
Configure the App Registration in Power BI Service #
- Sign in to the Power BI service / Fabric using an account with admin privileges.
- Go to the Settings menu (gear icon in the top-right corner) and select Admin portal.
- In the Tenant settings, locate the section for Admin API settings or Service principals.
16. Enable service principal access for the security group containing your app registration:
- Toggle Allow service principals can access read-only Admin API’s (or equivalent setting).
- Toggle Enhance admin APIs responses with detailed metadata.
- Toggle Enhance admin APIs responses with DAX and mashup expressions.
- Ensure the security group with your app registration is listed under Enabled security groups.

- Save the settings. Changes may take a few minutes to propagate.