Power BI Architecture

Power BI Architecture


power BI is the umbrella term for data visualization, reporting, and analytics tools and services from Microsoft. Power BI can import data from various sources and organize them to run queries, build reporting dashboards and data visualization. Power BI has a set of components available for different platforms and purposes
In this Power BI Architecture?Tutorial, we will learn about the following topics:

What is Microsoft Power BI Architecture?
The Web Front End Cluster
The Back End Cluster
Data Storage Security
User Authentication
Data & Repair Security

So, let’s start this Power BI Architecture Tutorial.

?

What is Microsoft Power BI Architecture?

The Power BI architecture is a service built upon Azure. Azure is Microsoft’s cloud computing infrastructure and platform.

This service design is predicated on 2 clusters – the?online front (Web Front End) cluster?and the?back finish (Back End) cluster. The Web Front End cluster is liable for initial association and authentication to the ability bismuth service, and once documented, the back finish cluster handles all resultant user interactions.

Power BI gateway?is connected on-premise data sources to Power BI Desktop or Power BI cloud services to get continuous data for reporting and analytics.

The Power BI architecture uses?the?Azure Active Directory (AAD)?to store and manage user identities. It manages the storage of knowledge and data victimization?Azure BLOB?and?Azure SQL?information, too.

You may go through this Microsoft Power BI recording where our expert has explained the topics in a detailed manner with examples that will help you to understand the concepts better.

?

Microsoft Power BI Certification Training Course
Explore Curriculum
Web Front End Cluster: Power BI Architecture

Web front end sees to the initial connection, client authentication and request routing to nearest data centers in Power BI.?Power BI uses??Azure Traffic Manager (ATM)?to direct user traffic to the nearest data-center, determined by the?Domain Name System(DNS)?record of the clientele attempting to connect to Power BI for the authentication process and to download static content and files. Power BI also uses the?Azure Content Delivery Network (CDN)?to efficiently distribute the necessary static content and files to users based on geographical location.

The Back End Cluster:?Power BI Architecture

The Back finish cluster manages the visualization, user dashboards, data-sets, reports, data storage, data connections, data refresh in Power BI services.

Power BI gateway?is connected on-premise data sources to?Power BI Desktop?or Power BI cloud services to get continuous data for reporting and analytics. It basically acts as a gateway between users and Power BI services. Users don’t act directly with any roles but the gateway Role.

All?data is stored in Azure BLOB storage and user azure storage account and authenticated by Azure Active Directory.?

?

Data Storage Security

The Power BI architecture uses 2 primary repositories for storing and managing knowledge.

The data that’s uploaded from users are often sent to Azure BLOB storage, and everyone data additionally as artifacts for the system itself square measure keep in Azure SQL information.

The line within the back end cluster image, as seen in the previous section on the left of the dotted line, clarifies the boundary between the sole 2 elements that square measure accessible by users, and roles that square measure solely accessible by the system.

Once an associate documented user connects to the service, the association and any request by the consumer is accepted and managed by the?gateway role, eventually to be handled by?Azure API Management.

BI and Visualization Training
MICROSOFT POWER BI CERTIFICATION TRAINING COURSE
Microsoft Power BI Certification Training Course
Reviews
?5(46622)
TABLEAU CERTIFICATION TRAINING COURSE
Tableau Certification Training Course
Reviews
?5(46984)
ADVANCED MS EXCEL 2016 CERTIFICATION TRAINING
Advanced MS Excel 2016 Certification Training
Reviews
?5(10903)
MSBI CERTIFICATION TRAINING COURSE
MSBI Certification Training Course
Reviews
?5(13882)
QLIKVIEW CERTIFICATION TRAINING
QlikView Certification Training
Reviews
?5(10041)
PENTAHO BI CERTIFICATION TRAINING
Pentaho BI Certification Training
Reviews
?4(3823)
MICROSTRATEGY 10 CERTIFICATION TRAINING
MicroStrategy 10 Certification Training
Reviews
?5(2132)
Next

This then interacts on the user’s behalf with the remainder of the Service. Additionally,?once a consumer makes an attempt to look at a dashboard, the gateway Role accepts that request then individually sends a letter of invitation to the?Presentation Role?to retrieve the information required by the browser to render the dashboard.

?

User Authentication

Users log in to the service via the e-mail address used to establish their Power BI Services account.

The architecture of Power BI users that login email because of the effective username, that is passed to resources whenever a user makes an attempt to access a piece of information. The effective username is mapped to a?User Principal Name (UPN)?and all resolve associated to the windows domain account, apply to it.

For organizations that use work emails for Power BI architecture login (such as [email protected]), the effective username to UPN mapping is easy. For organizations that fail to use work emails for Power BI architecture login, a mapping between the AAD and on-premises credentials would force directory synchronization on to it.

Platform security for architecture?includes multi-tenant surroundings security, and networking security, therefore, the ability to feature extra AAD-based security measures.

?

Data and Repair Security

As described earlier in this article, a user’s Power BI architecture login is employed by on-premises Active Directory servers to map to a UPN for credentials. However, it’s crucial to notice that users square measure liable for they share. If a user connected to data sources victimizes her credentials and shares a report supported that data, the users with whom the dashboard is shared cannot be granted access to the report.

An exception to this is the connection to?SQL Server associate analysis Services. Access to underlying reports or data sets initiates authentication for the user making an attempt to access the report. And access can solely be granted if the user has spare credentials to access the info..        

要查看或添加评论,请登录

Ankita Verma的更多文章

  • Project Management Tools that are used for effective Project Planning

    Project Management Tools that are used for effective Project Planning

    If you have stumbled on this page, then you’re probably wondering “What the heck are Project Management tools?” Let’s…

  • Seven Analytic Tools that Every Business Analyst Should Know

    Seven Analytic Tools that Every Business Analyst Should Know

    from supply chain management to enterprise resource planning, every business department requires relevant data for the…

  • data Analytics Tools

    data Analytics Tools

    In this blog on Best?Big Data Analytics tools, we will learn about Best Data Analytic Tools. Also, will study these…

  • Marketing Analytics Tools That Are Shaping the Industry

    Marketing Analytics Tools That Are Shaping the Industry

    Few marketers would admit to having "an excellent handle" on their analytics. But don't blame it on the marketer Marc…

  • Big Data Analytics Tools

    Big Data Analytics Tools

    Businesses can use data analytics technologies to evaluate large amounts of data in order to gain a competitive…

  • Different Types of IT Tools

    Different Types of IT Tools

    There are numerous tools aimed at helping IT professionals operate more efficiently and deliver the most effective…

  • 7 convenient communication tools

    7 convenient communication tools

    Following are a handful of such tools. If you have a favorite and don’t see it included here, leave a comment below…

  • Data Analytics Tools

    Data Analytics Tools

    The amount of data produced by humans has exploded to unheard-of levels, with?nearly 2.5 quintillion bytes of…

  • Web Analytics Tools

    Web Analytics Tools

    Web analytics is a way of collecting and analyzing what’s happening on your website to see what your visitors are…

  • Google Cloud Platform (GCP)

    Google Cloud Platform (GCP)

    In?recent years the market for Cloud Computing has grown unexpectedly. There are many Cloud providers in the market…

社区洞察

其他会员也浏览了