Before ingesting semantic models from your Power BI workspace via XMLA endpoint into Dawiso, prepare your account for authentication by configuring an Azure Application and granting the necessary permissions.
Connection prerequisites
- An active Azure Portal subscription (you can create one for free)
- Microsoft Entra ID administrative access.
- Power BI Service tenant and account with administrative privileges. You can use this simple tutorial to configure it.
Connection configuration
Dawiso scans semantic models from Power BI workspaces using a registered app (service principal) that is connected to the workspace XMLA endpoint.
In this guide, you will:
- Configure an Azure application.
- Generate a Client Secret.
- Test the application for a successful connection to Azure AD.
- Configure a Power BI Tenant to allow service principals to connect via XMLA endpoints.
- Allow the service principal access to individual workspaces.
Register a new application
You need to register a new application in Microsoft Entra ID.
- In your Azure Portal, navigate to Microsoft Entra ID.
- In the left menu, select the App Registrations. Click the + New Registration button.

- Choose a name name for your application, e.g., Dawiso Integration. You can keep default values for the rest of the form.
- Click Register and wait for the deployment to finish.

Client and tenant IDs
On the Overview page, you can find important values that identify your application. These will be used in the connection setup in Dawiso:
- Application (client) ID is the unique identification of the application.
- Directory (tenant) ID is the unique identification of your tenant (organization).
Generate Client Secret
Now, you will need to generate a client secret to later authenticate the connection.
- In the left menu, select Certificates & secrets.
- Here, click + New client secret.

- Choose a descriptive name for the client secret and select an expiration date that fits your organization’s requirements.

- Click Add to finish creating the secret.
- Once the secret is created, make sure to copy the value and store it somewhere safe for later use. The secret cannot be displayed twice.

The secret value is displayed only once. Copy and save it immediately, otherwise you will need to generate a new client secret if it is lost.
Create a security group in Microsoft Entra ID
To follow security best practices, assign Power BI Admin API access to the service principal via a Microsoft Entra ID security group only.
- In your Microsoft Entra ID, navigate to Groups.

- Click New group.

- Choose the Security group type and choose a descriptive name, e.g., in this case,
Power BI Service Principals.
- Click Create to finish the group configuration.
Add members to the group
- On the Groups page, click the name of the newly created group.

- Click + Add members.

- Using the search box, find your application (in our case Dawiso Integration) and select it using the checkbox.

- Click Select to finish adding the application as a member.
- On the group’s page, you can double-check whether the application has been added successfully.

Configure Power BI Tenant
Using an account with administrative privileges, navigate to your Power BI Admin Portal. Here, you can create a new Power Platform and Fabric Administrator or assign an existing user to the role. See more details in the Microsoft Fabric documentation.
- Select Tenant settings in the Portal.

- In the Developer settingssection:
- Find the Allow XMLA endpoints and Analyze in Excel with on-premises semantic models item and enable it.
- Apply it to Specific security groups.
- Find the newly created security group (in this case,
Power BI Service Principals) and add it. - Click Apply to finish the configuration.

- In the Admin API settingssection:
- Find the service principals can call Fabric public APIs item and enable it.
- Apply it to Specific security groups.
- Find the newly created security group (in this case,
Power BI Service Principals) and add it. - Click Apply to finish the configuration.

Allow service principal access to individual Workspaces
To ingest semantic models metadata via XMLA endpoint, the Service Principal requires access to the workspace(s) with the Member role or higher.
- On your Power BI homepage, select the workspace for which you want to configure the access.
- Click Manage access.

- Continue with clicking Add people or groups.

- Find and add the newly created security group (in this case,
Power BI Service Principals), and change the role to Member. - Click Add to allow the security group to access your workspace with member access rights.

You have successfully configured Power BI for integration with Dawiso. Next, create a connection in Dawiso to start metadata ingestion.