Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Power Bi Architecture With Data Security

1. Objective

In this Power Bi tutorial, we will learn about the Power Bi Architecture. Moreover, we will study,Data Storage Security,User Authentication, and Data & Repair Security.

So, let’s start a Power Bi Architecture Tutorial.

Power Bi Architecture   With Data Security

Power Bi Architecture

2.What is Microsoft Power Bi Architecture?

The Power BI architecture service made on Azure, that is Microsoft’s cloud computing infrastructure and platform.The ability to bismuth service design is predicated on 2 clusters the online front (WFE) cluster and therefore the side cluster. The WFE cluster is liable for initial association and authentication to the ability bismuth service, and once documented, the rear finish handles all resultant user interactions. Power Bi architecture uses Azure Active Directory (AAD) to store and manage user identities and manages the storage of knowledge and data victimization Azure BLOB and Azure SQL information, severally.

3. Power Bi Architecture

Each Power bi architecture readying consists of 2 clusters an online front (WFE) cluster, and a side cluster.

The WFE cluster manages the initial association and authentication method for Power bi architecture, victimization AAD to manifest purchasers and supply tokens for resultant consumer connections to the ability bismuth service. Power bi architecture conjointly uses the Azure Traffic Manager (ATM) to direct user traffic to the closest datacenter, determined by the DNS record of the consumer making an attempt to attach, for the authentication method and to transfer static content and files. Power bi architecture uses the Azure Content Delivery Network (CDN) to expeditiously distribute the mandatory static content and files to users supported geographical locus.

Power Bi Architecture   With Data Security

Microsoft Power Bi Architecture Diagram-1

The Back finish cluster is however documented purchasers act with the ability for bismuth service. the rear finish cluster manages visualizations, user dashboards, datasets, reports, knowledge storage, knowledge connections, knowledge refresh, and different aspects of interacting with the ability bismuth service. The entranceway Role acts as an entranceway between user requests and therefore the Power bi architecture service. Users don’t act directly with any roles nonetheless the entranceway Role. Azure API Management can eventually handle the entranceway Role.

Power Bi Architecture   With Data Security

Microsoft Power Bi Architecture Diagram-2 4. Data Storage Security

Power bi architecture uses 2 primary repositories for storing and managing knowledge: data that’s uploaded from users is often sent to Azure BLOB storage, and every one data additionally as artifacts for the system itself square measure keep in Azure SQL information.

The line within the side cluster image, above, clarifies the boundary between the sole 2 elements that square measure accessible by users (left of the dotted line), and roles that square measure solely accessible by the system. once an associate documented user connects to the ability bismuth Service, the association and any request by the consumer is accepted and managed by the entranceway Role (eventually to handle by Azure API Management), that then interacts on the user’s behalf with the remainder of the ability bismuth Service. parenthetically, once a consumer makes an attempt to look at a dashboard, the entranceway Role accepts that request then individually sends a letter of invitation to the Presentation Role to retrieve the info required by the browser to render the dashboard.

5. User Authentication

Power bi architecture uses Azure Active Directory (AAD) to manifest users World Health Organization login to the ability bismuth service, and successively, uses the ability bismuth login credentials whenever a user arranges to resources that need authentication. Users log in to the ability bismuth service victimization the e-mail address accustomed establish their Power bi architecture account; Power bi architecture uses that login email because the effective username, that pass to resources whenever a user makes an attempt to attach to knowledge. The effective username map to a User Principal Name (UPN) and resolv to the associated windows domain account, against that authentication, is apply.

For organizations that used work emails for Power bi architecture login (such as david@contoso.com), the effective username to UPN mapping is easy. For organizations that failed to use work emails for Power bi architecture login (such as david@contoso.onmicrosoft.com), a mapping between AAD and on-premises credentials would force directory synchronization to figure properly.

Platform security for architecture conjointly includes multi-tenant surroundings security, networking security, and therefore the ability to feature extra AAD-based security measures.

6. Data and Repair Security

For a lot of data, please visit the Microsoft Trust Center.

As delineate earlier in this article, a user’s Power bi architecture login is employed by on-premises Active Directory servers to map to a UPN for credentials. However, it’s vital to notice that users square measure liable for they share: if a user connects to data sources victimization her credentials, then shares a report supported that data, users with whom the dashboard is shared don’t seem to document against the first knowledge supply and can grant access to the report.

An exception is connections to SQL Server associate analysis Services victimization the On-premises knowledge gateway; dashboards square measure cached in Power bi architecture. However, access to underlying reports or datasets initiate authentication for the user making an attempt to access the report (or dataset), and access can solely grant if the user has spare credentials to access the info. For a lot of data, see On-premises knowledge entranceway deep dive.

So, this was all about Microsoft Power Bi Architecture Tutorial. Hope you like our explanation.

7. Conclusion

Hence, in this tutorial, we studied the architecture of power bi and many other points related to the topic. Still, you have any doubt, feel free to ask in the comment section.

Viewing all articles
Browse latest Browse all 12749