Set up Microsoft Fabric
Configure Microsoft Fabric authentication and permissions to enable metadata extraction and lineage tracking with Atlan.
Prerequisites
Before you begin, make sure you have:
- Access to Azure portal and Microsoft Fabric admin portal
- Cloud Application Administrator or Application Administrator role in Microsoft Entra ID
- Fabric Administrator privileges in Microsoft Fabric
Register application in Microsoft Entra ID
Create an application registration to enable service principal authentication with Microsoft Fabric.
- Log in to the Azure portal.
- Search for Microsoft Entra ID and select it.
- Click App registrations from the left menu.
- Click + New registration.
- Enter a name for your client application and click Register.
- From the Overview screen, copy and securely store:
- Application (client) ID
- Directory (tenant) ID
- Click Certificates & secrets from the left menu.
- Under Client secrets, click + New client secret.
- Enter a description, select an expiry time, and click Add.
- Copy and securely store the client secret Value. The client secret value is only displayed once, so make sure to copy and store it securely before leaving this page.
Create security group in Microsoft Entra ID
Create a security group to manage permissions for your application registration.
- In the Azure portal, navigate to Microsoft Entra ID.
- Click Groups under the Manage section.
- Click New group.
- Set the Group type to Security.
- Enter a Group name and optional description.
- Click No members selected.
- Search for the application registration created earlier and select it.
- Click Select and then Create.
Configure service principal authentication
Grant the service principal the necessary permissions to access Microsoft Fabric resources.
Assign workspace permissions
- Open the Microsoft Fabric homepage.
- Navigate to Workspaces and select the workspace you want to access from Atlan.
- Click Manage Access.
- Click Add people or groups.
- Enter the name of your service principal where it says Enter name or email.
- Choose Viewer as the role.
- Click Add.
Repeat these steps for each workspace you want Atlan to access.
Enable admin API access
-
Log in to the Fabric admin portal.
-
Click the Settings icon on the top panel.
-
Click Admin Portal under the Governance and insights section.
-
Select Tenant Settings from the sidebar.
-
Under Admin API settings, configure the following:
-
Service principals can access read-only admin APIs:
- Set to Enabled
- Add your security group under Specific security groups
- Click Apply
-
Enhance admin APIs responses with detailed metadata:
- Set to Enabled
- Add your security group
- Click Apply
-
Enhance admin APIs responses with DAX and mashup expressions:
- Set to Enabled
- Add your security group
- Click Apply
-
After making these changes, you typically need to wait 15-30 minutes for the settings to take effect across Microsoft's services.
Next steps
- Crawl Microsoft Fabric: Discover and catalog your Microsoft Fabric workspaces and assets