© Ásgeir Gunnarsson and Michael Johnson 2020
Á. Gunnarsson, M. JohnsonPro Microsoft Power BI Administrationhttps://doi.org/10.1007/978-1-4842-6567-3_12

12. Managing users and security

Ásgeir Gunnarsson1   and Michael Johnson2
(1)
Hafnarfjordur, Iceland
(2)
St. Andrews, South Africa
 
Read this chapter if you would like to find out more information about
  • How Power BI implements user authentication

  • Enhanced security options

Security, like many features in Power BI, leverages other infrastructure components in the Office 365 and Azure platforms. In the case of Office 365, including Power BI, security is implemented using Azure Active Directory (AAD), which is a web-scale Platform as a Service (PaaS) in Azure. Azure Active Directory is built on the foundations ...

Get Pro Microsoft Power BI Administration: Creating a Consistent, Compliant, and Secure Corporate Platform for Business Intelligence now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.