AD Authentication in Power BI - authentication

Is it possible to implement AD Authentication in PowerBI. If yes, how to do AD Authentication for PowerBI.
I need to know the step. And if its not possible, then what are the Alternative for that.

Authentication in Power BI is done using Azure Active Directory (AAD). You can read about it here. There are techniques for sync'ing your AD with AAD.
Here's how to create an App in Azure Active Directory: https://msdn.microsoft.com/en-us/library/dn877542.aspx
Here's a starting point for the sync feature I mentioned:
http://blogs.technet.com/b/ad/archive/2014/09/16/azure-active-directory-sync-is-now-ga.aspx

Related

Could I use selfhost AD with OpenPAI?

For some reasons, our servers cannot connect to the Internet so we have a selfhost AD server to manage users. I wonder if I could use it because the docs only say they support AAD :( Thanks!
It's not possible to self-host AAD.
Except for AAD, OpenPAI provides also basic authentication mode, which you can use without internet access.
As a reference, there are tools like Azure AD Connect that can help to sync your on-prem & cloud auth system.

Pulling Azure Security data into Power BI Desktop using Graph Security API: How to set permissions in Azure AD

I'm attempting to connect the Microsoft Graph Security API Connector to Power BI Desktop. Everything seems to work okay until I try to set 'Application' or advanced 'Delegated' authorizations so I can execute GET commands, such as '/security/securityActions', '/security/TiIndictors' and '/security/securityEvents'.
When using the Graph Security API Connector in Power BI, it automatically connects to my Azure tenant as a Service Principle (e.g. Enterprise Application) with an App ID = 'cab163...'. However, this Enterprise Application doesn't have an intuitive way to add additional permissions.
The documentation https://learn.microsoft.com/en-us/power-bi/desktop-connect-graph-security only talks about Delegated authorization.
Any guidance would be helpful. I'm sure it's an easy solution - it's seriously eluding me.
Thanks!
To set permissions for Application Only mode, please refer to the Application permissions section.
Your app needs to be consented by an administrator.

Migrate user credentials ( User Name,Password) from SQL DB to Azure AD B2C

Is there any way to migrate users info (username, password) from SQL DB to Azure AD B2C. In Azure AD there is way to migrate user credentials using AD Connect. But AD B2C does not supports AD Connect. Can you please help is there any other alternative ways to migrate users credentials?
You can do that using the Graph API. The exact way depends on whether you have access to the user's passwords, or just a one-way hash of them.
The steps necessary are documented in the AAD B2C User migration guide.
There is no existing tool for it like AD Connect. You have to develop your own, but the documentation has a sample app that you can use as a starting point.

Multi Tenancy in a SAAS REST API Authentication

I'm currently developing a API to commercialized in a B2B SAAS fashion.
The goal is to authenticate the worker of the company. We have an SDK that should be able to do that. There is the possibility to force each user to set credentials specific for our service, but that will hurt integration with companies applications.
The idea would be to have some kind of authentication (client independent) that make it easier to authenticate users.
The question is: There is a easy way to create an automatic process that does not depend on the client type of authentication methods, for this type of task?
Thanks in advance.
Have you taken a look at Azure AD? It specifically supports multi-tenant scenarios.
Tenants can use Azure AD Connect to sync their on-premise directory to the cloud. Clients can use ADAL to acquire a token which your service trusts. The issued token contains a tenant-id claim indicating via which tenant the user logged in.
Just to add to MvdD answer, in Azure AD support three ways to sign in:
Federated Single Sign-On enables applications to redirect to Azure AD
for user authentication instead of prompting for its own password.
This is supported for applications that support protocols such as SAML
2.0, WS-Federation, or OpenID Connect, and is the richest mode of single sign-on.
Password-based Single Sign-On enables secure application password
storage and replay using a web browser extension or mobile app. This
leverages the existing sign-in process provided by the application,
but enables an administrator to manage the passwords and does not
require the user to know the password.
Existing Single Sign-On enables Azure AD to leverage any existing
single sign-on that has been set up for the application, but enables
these applications to be linked to the Office 365 or Azure AD access
panel portals, and also enables additional reporting in Azure AD when
the applications are launched there.

Any standardized login functionality available in Azure

We are looking to host our product on Azure- the intent behind using Azure is that we get to focus on the core product, and are fine with the standard cloud features that Azure offers without needing to understand too much of the internals- not exactly the power users!
One thought was that if Azure had an authentication functionality- profiles, logins, password reset/ reminder etc, it would save us time from building what is essentially a commodity
Any guidance on this?
Azure offers the Access Control Service, which is a Federated Authentication service. It's already preconfigured with support for Live ID, Google and Yahoo authentication, but you can also add your own security token service (such as ADFS).
Windows Azure does not have a built in login feature. However,App Fabric Access Control Service(ACS) does; see the ACS tutorial here for example usage.