Skip to main content

Authorizing Tenant Environments

Updated today

📝NOTE: The availability of this feature may be limited based on the license type, region, and other criteria. To access this feature, contact support.

To discover and back up workspaces in the Druva console, you must complete specific configurations in your Microsoft Azure and Power BI environments. These steps enable the Druva Service Principal to access the required APIs.


Step 1: Create/update Azure Security Group

Objective: Create a standard Security Group in Azure to house the Druva service principal.

  1. Access Azure: Log in to the Azure Portal.

  2. Create Security Group: Navigate to Entra ID > Groups > New group.

    • Group type: Select Security.

  3. Group name: Assign a descriptive name (e.g., Power BI Service Principle).

  4. Group Description: Provide a description for this group.

  5. Add Druva Application Member:

    • Open the newly created group and select Members > Add members.

    • Search Criteria: Search for the application name Druva Powerplatform.

    • Action: Select the application and click Select to add it to the group.

    screen showing steps to add members to groups in Azure

Summary: You have created a container (Security Group) and added the Druva service principal (Druva powerplatform app) as a member to enable identity-based permissions.


Step 2: Authorize Power BI Admin and Fabric Public APIs

Objective: Grant the Security Group created in Part 1 permission to access Power BI Admin read-only APIs.

  1. Access Admin Settings: Log in to the Power BI Admin Portal.

  2. Locate API Settings: Navigate to Tenant settings > Admin API settings.

  3. Configure ‘Service Principal settings’:

    1. Find the setting: Service principals can call Fabric public APIs under Developer Settings section.

      1. Set the toggle to Enabled.

      2. Define Access Scope:

        1. Under Apply to, select the radio button for Specific security groups.

        2. Search: Enter the name of the Security Group created in Step 1.

        3. Click Apply.

          authorizing  Service principals can call Fabric public APIs in Power BI admin portal


    2. Find the setting: Service principals can access read-only admin APIs under Admin API Settings section.

      1. Set the toggle to Enabled.

      2. Define Access Scope:

        1. Under Apply to, select the radio button for Specific security groups.

        2. Search: Enter the name of the Security Group created in Step 1.

        3. Click Apply.

          authorizing  Service principals can access read-only admin APIs in Power BI admin portal

Summary: By enabling the Service Principal setting for a specific group, you have authorized the Druva application to call Power BI APIs without granting tenant-wide administrative rights.

📝NOTE: If the Azure environment setup is complete but discovery is not working, ensure that KMS is configured. Without KMS enabled, discovery will not initiate.


Step 3: Adding the Service Principal to the Power BI Workspace

📝 Note: If this step is not completed, the backup operation will still be marked as successful. However, only the metadata is backed up, and the actual report file is not included in the backup.

  1. Navigate to the required Workspace.

  2. In the top-right corner, click Manage access.

  3. Click + Add people or groups.

  4. Search for the Service Principal by name and select it.

  5. From the permissions dropdown, select Contributor.

  6. Click Add to save changes.

    Adding security group as a contributor to a workspace

Important: Synchronization Latency Microsoft may require up to 24 hours to synchronize permission changes across the environment.


Verify Discovery Status

After configuration, Druva automatically scans the tenant. Check the Status Indicators:

  • Connected: The app is successfully authenticated.

  • Discovery Not Started: This status appears if the Azure prerequisites (Security Group/API settings) are not detected. You must complete the steps before discovery can proceed.

Once all prerequisites are met, discovery begins automatically. After the environment scan is complete, the system populates the list of workspaces.


Did this answer your question?