Skip to main content

Privacera Documentation

Table of Contents

Power BI connector properties for PolicySync on Privacera Platform

These Power BI connector properties can be set for PolicySync in Privacera Platform.

The properties are grouped by general function, such as JDBC connection properties, properties for user, group, and role management, and other functions.

The properties are also categorized as BASIC or ADVANCED:

  • BASIC pertains to the most fundamental aspects of the connector, such as authentication.

  • ADVANCED indicates additional features beyond the BASICs, such as row-filtering or group member handling.

Start by setting the BASIC properties and then examine the ADVANCED properties to determine which of these features you might want to enable.

For a general process to migrate values from old YAML files to the new YAML files, see Migration to PolicySync v2 on Privacera Platform 7.2.

Category

Property name

Description

Default

Allowable values

Connection configuration properties

BASIC

CONNECTOR_POWER_BI_USERNAME

Username for authentication with Power BI. For authentication either username/password or client secret is needed

BASIC

CONNECTOR_POWER_BI_PASSWORD

Password for authentication with Power BI. For authentication either username/password or client secret is needed

BASIC

CONNECTOR_POWER_BI_TENANT_ID

Tenant Id is needed for authentication. To get the value for this property in the Azure portal, go to Azure Active Directory > Properties > Tenant ID.

BASIC

CONNECTOR_POWER_BI_CLIENT_ID

Client Id is needed For authentication. To get the value for this property in the Azure portal, go to Azure Active Directory > Properties > Client (Application) ID.

BASIC

CONNECTOR_POWER_BI_CLIENT_SECRET

Client Secret for authentication with Power BI.

Resources management

BASIC

CONNECTOR_POWER_BI_MANAGE_WORKSPACE_LIST

Add the names of the workspaces to be managed. Only these workspaces will be provided with access control in a Power BI policy. Regular expression can be used. For example: demo* (This will manage all the workspaces named as demo1 ,demo2, etc).

Note

Values for this property are case-sensitive.

ADVANCED

CONNECTOR_POWER_BI_IGNORE_WORKSPACE_LIST

Add the names of the workspaces to be ignored. These workspaces will not be provided with access control in a Power BI policy.

Note

Values for this property are case-sensitive.

Users/Groups/Roles management

ADVANCED

CONNECTOR_POWER_BI_USER_NAME_REPLACE_FROM_REGEX

This takes the regular expression as input and finds the matching characters in a user name and replaces them with the characters specified in property. If kept blank, no find and replace operation is performed.

[^a-zA-Z0-9@.\\\\s]

ADVANCED

CONNECTOR_POWER_BI_USER_NAME_REPLACE_TO_STRING

The value specified in this property is used to replace the characters found by the regex specified user name regex property. If kept blank, no find and replace operation is performed.

_

ADVANCED

CONNECTOR_POWER_BI_GROUP_NAME_REPLACE_FROM_REGEX

This takes the regular expression as input and finds the matching characters in a group name and replaces them with the characters specified in property. If kept blank, no find and replace operation is performed.

[^a-zA-Z0-9@.\\\\s]

ADVANCED

CONNECTOR_POWER_BI_GROUP_NAME_REPLACE_TO_STRING

The value specified in this property is used to replace the characters found by the regex specified group name regex property. If kept blank, no find and replace operation is performed.

_

ADVANCED

CONNECTOR_POWER_BI_USER_NAME_PERSIST_CASE_SENSITIVITY

After loading users from Ranger API's all are converted into lowercase, but in some cases, you would need to have the users in the same case as they are in Ranger. When setting this value to true, it will maintain the case sensitivity of names as they are in Ranger.

false

ADVANCED

CONNECTOR_POWER_BI_GROUP_NAME_PERSIST_CASE_SENSITIVITY

After loading groups from Ranger API's all are converted into lowercase, but in some cases, you would need to have the users in the same case as they are in Ranger. When setting this value to true, it will maintain the case sensitivity of names as they are in Ranger.

false

ADVANCED

CONNECTOR_POWER_BI_MANAGE_USER_LIST

This property is used to set comma separated user names which access control should be managed by policysync. If you want to manage all users then you can skip specifying this property. This supports wildcards as well. The ignore users list has precedence over manage users list. For example: user1,user2,dev_user*

ADVANCED

CONNECTOR_POWER_BI_MANAGE_GROUP_LIST

This property is used to set comma separated group names which access control should be managed by policysync. If you want to manage all groups then you can skip specifying this property. This supports wildcards as well. The ignore group list has precedence over manage group list. For example: group1,group2,dev_group*

ADVANCED

CONNECTOR_POWER_BI_IGNORE_USER_LIST

This property is used to set comma separated user names which access control you don't want to be managed by policysync. If you don't want to ignore any users then you can skip specifying this property. This supports wildcards as well. This has precedence over manage users list. For example: user1,user2,dev_user*

ADVANCED

CONNECTOR_POWER_BI_IGNORE_GROUP_LIST

This property is used to set comma separated group names which access control you don't want to be managed by policysync. If you don't want to ignore any groups then you can skip specifying this property. This supports wildcards as well. This has precedence over manage groups list. For example: group1,group2,dev_group*

CONNECTOR_POWER_BI_USER_FILTER_WITH_EMAIL

Set this property to true, if you want to manage only the users who contain the email field not blank.

false

ADVANCED

CONNECTOR_POWER_BI_MANAGE_USER_FILTERBY_GROUP

Set this property to true, if you want to manage only the users who belong to the groups defined in manage groups list property.

false

Access control management

BASIC

CONNECTOR_POWER_BI_GRANT_UPDATES

This property controls whether actual grant/revoke and create/update/delete queries for user/group/role should be run on power bi.

true

Access audits management

BASIC

CONNECTOR_POWER_BI_ENABLE_AUDIT

This property is used to enable access audit fetching from power bi.

false