Click the "App Registrations" option in the left sidebar.
STEP 2: Create a new registration
Click on "New Registration" and enter the following information:
Application Name: AtlanPowerBIIntegration
Supported account types: Accounts in this organizational directory ... only - Single tenant)
Click on "Register" to complete the registration.
STEP 3: Add permissions
Click on "API Permissions", and select "Add Permission".
Search for the Power BI service, and click on "Delegated permissions". Select the permissions mentioned below.
Click on the "Grant Admin consent" button, which is located next to the "Add permission" button. This allows the Atlan crawler to run as a daemon without having to ask the user permission on every crawler run. Only administrators of the tenant can perform this action.
This is how the AAD application's API permission screen should look after the above changes.
AAD application API permission screen
STEP 4: Create a Client Secret
On the application page, select "Certificates and Secrets".
Click on "Secret" and add a description.
Set the expiration to "Never".
Click on "Create", and copy the secret value.
STEP 5: Get the Tenant ID and Client ID from the Azure portal
On the application home page, click on the "Overview" tab in the left sidebar.
From the "Essentials" section, copy the Tenant and Client ID.
🔑 Creating an Atlan Azure Active Directory application (with Service Principal as the credential)
This method does not work with Classic Workspaces.
An Administrator should perform the steps below, since they will need Administrator Approval.