đĨAzure AD App
Last updated
Last updated
Inforiver will use multiple Office 365 APIs to fetch relevant information like Power BI Report metadata, User emails and groups, SharePoint and OneDrive integration. For this Azure AD application, steps needs to be created in your tenant by following the steps mentioned below. The details would be needed from app while we deploy our application.
Following are the steps to create Azure AD application and collect the required details to continue the Inforiver deployment.
As a first step you have to register a new app in your Azure AD.
Login into your Azure Portal
Click on Manage Azure Active Directory from the menu tab
Click App registrations in the left sub menu
Click the New Registration tab in the top menu bar as shown in the blow screenshot.
Enter an Application Name to be displayed to the users - In the section Who can use this application, select Accounts in this organizational directory only - In the section Redirect URI, please leave it for now. We have to come back once we get the URL of the application. - Click Register to register the application.
Please follow the steps to continue the configuration of the Azure AD application.
The Azure AD app needs to have certain permissions enabled for Inforiver to work properly. Please follow the steps below to enable those permissions.
To view the complete list of required and optional permissions and why Inforiver requires these permissions, please read through the below page.
Go to the API Permissions menu of the Azure AD App that you created in the previous step.
Click Add a Permission, then select Microsoft Graph -> Delegated Permissions and select the following permissions:
openid
profile
User.Read
User.ReadBasic.All
Group.Read.All
GroupMember.Read.All
After selecting all the above permissions, click the Add Permissions button at the bottom.
Now, click Add a Permission once again, then go to Power BI Service -> Delegated Permissions. Select the following permissions:
Dataset.Read.All
Report.Read.All
Workspace.Read.All
App.Read.All
Dashboard.Read.All
After selecting all the above permissions, click the Add Permissions button at the bottom.
Similarly, click Add a Permission, then select Azure Storage -> Delegated Permissions. Select the permission:
> user_impersonation
Click the Add Permissions button at the bottom.
Grant admin consent for the entire organization to authorize this application for your users.
If your organization have a policy which disallows users to provide consent to the application on their own, then make sure that you have provided admin consent for the entire organization.
As the final step, you have to generate a client secret and collect the necessary details for the deployment.