PowerBI.com

Microsoft Power BI – Part – VI

Continuing from my previous post, if you have not seen yet please check it out it will help you continuing with this post.

You can check:

Microsoft Power BI – Part – I

Microsoft Power BI – Part – II

Microsoft Power BI – Part – III

Microsoft Power BI – Part – IV

Microsoft Power BI – Part – V

Today we will discuss how to use Power BI Content Pack:

PowerBI-60

Few things to keep in mind to get report Generated Successfully.

Point-1 You have required objects for this content pack in your database.

If you are using 2016, you can skip this as these objects are available in 2016. If you are using 2015 or 2013 then export these objects from 2016 and import in your database.

PowerBI-61

Above Pages will be present in your previous version of database, you need to import the 6 Query objects. These are necessary as these are used as source to fetch data from your data base by this content pack.

Point-2 Web Services need to be published.

PowerBI-62

Make sure you use same name for Services as you may get error while connecting and refreshing/ fetching data using this content pack.

Point-3 SSL port and web address is used to access the services.

https is used as this will not work on http.

Self-signed certificate will not work which we use for test purpose for publishing services and testing. It will throw Trusted relationship connection type error. If you have one use the same instead using Self-signed certificate.

No worries, don’t be disappointed. I will give you tip to overcome this requirement just follow as below:

You may remember that in our previous post we installed and used Power BI Gateway, actually we got a Trusted Certificate which we can use for this purpose.

PowerBI-63

Open IIS Manager on your system.

PowerBI-64

Select Serve/ Machine in Left Navigation Tree and Select Server Certificates.

PowerBI-65

Locate the Data Management Gateway SSL Certificate, this got installed when you installed Gateway. Double click to open the Properties of the certificate.

PowerBI-66

Switch to Details Tab, Scroll down to find Thumbprint, and Copy the Thumbprint and paste to Notepad finally remove all space leading, trailing and any in between.

It should look like above right bottom corner notepad window no space in Thumbprint signature.

Copy this Value and use as Thumbprint in you Navision Service.

PowerBI-67

Select Your Service.

Edit.

Paste the Certificate Thumbprint.

Make Sure SSL is Enabled for your OData Services.

Save.

Restart the Service.

We are done with the basic requirements now let us connect using Power BI Miscrosoft Navision Content Pack.

Now Login with your credentials to Power BI.

PowerBI-68

From Left bottom corner Select Get Data.

PowerBI-69

Select Get Data from Services.

PowerBI-70

Scroll to find Microsoft Dynamics NAV Services and Select Connect.

PowerBI-71

Copy your OData Service URL. Make sure you remove Service name from the URL and trailing ‘/’ after company name from the URL.

Select Next.

PowerBI-72

Select the Authentication Method and then Sign In.

PowerBI-73

Wait for few minutes you dataset will be loaded.

As a result you will get: Dataset, Report & Dashboard ready for you in few minutes depending upon the data volume and connection speed.

PowerBI-74

The report and dashboard view will be as per the available data in your database.

Hurray!!!

You are done with your practice session.

This is a Holi Gift for my reader from my side.

I will come up with more features explanation and other Tips & Tricks in my upcoming posts, till then keep practicing and learning from blogs and helps available online.

 

Development Tips

How to create and install a test certificate for the Microsoft Dynamics NAV Server computer

To start with this exercise you need to first create certificate and certificate revocation list, if not yet created refer to previous post.

Previous Step Link- How to create a root CA and a private key file by using the makecert.exe utility

Previous Step Link- How to create certificate revocation list for the root certification authority

Let’s start with this exercise:

  • At the command prompt, type the following command:

makecert -sk NavServiceCert -iv RootNavServiceCA.pvk -n “CN=NavServiceCert” -ic RootNavServiceCA.cer -sr localmachine -ss my -sky exchange -pe NavServiceCert.cer

Note

This command specifies the subject’s certificate name as NavServiceCert. You need this certificate name when you configure the Microsoft Dynamics NAV Windows client or Microsoft Dynamics NAV Web Server components.

Certificate-13

  • When you are prompted, enter the password that you used to create the root CA.
  • Select the Trusted Root Certificate Authorities node, and then refresh the snap-in.

You now have the NavServiceCert.cer certificate file in your temporary folder. The certificate is installed under the Personal node in the Certificates Snap-in.

Certificate-14
In next step we will now grant access to the certificate’s private key to the service account on computer running Microsoft Dynamics NAV Server.

Next Step Link- How to grant access to the certificate’s private key to the service account for the Microsoft Dynamics NAV Server computer

Development Tips

How to create a certificate revocation list for the root certification authority

To start with this exercise you need to first create certificate, if not yet created refer to previous post.

Previous Step Link- How to create a root CA and a private key file by using the makecert.exe utility

Let’s start with this exercise:

  • On the computer running Microsoft Dynamics NAV Server, create a temporary folder to use when you work with certificates.
  • Open the command prompt as follows:
    • If you have Visual Studio installed on your computer, choose Start, choose All Programs, choose Microsoft Visual Studio 2012, choose Visual Studio Tools, and then right-click Visual Studio Command Prompt and choose Run as Administrator.
    • If you have the Windows SDK installed on your computer, choose Start, choose All Programs, choose Microsoft Windows SDK, and then right-click Windows SDK Command Prompt (2010) (or CMD Shell) and choose Run as Administrator.
  • At the command prompt, locate the temporary directory.
  • At the command prompt, type the following command:

makecert -crl -n “CN=RootNavServiceCA” -r -sv RootNavServiceCA.pvk RootNavServiceCA.crl

  • When you are prompted, enter the password that you used to create the root CA.

Certificate-9
The RootNavServiceCA.crl certificate revocation file is saved in your temporary folder.
Certificate-10
Now we will install the certificate revocation list on the computer running Microsoft Dynamics NAV Server

  • In the Certificates snap-in, in the left pane of MMC, expand the Certificates (Local Computer) node.
  • Expand the Trusted Root Certification Authorities node, right-click the Certificates subfolder, select All Tasks, and then choose Import.
  • In the Certificate Import Wizard, on the Welcome page, choose Next.
  • On the File to Import page, choose Browse.
  • In the File Type field, select Certificate Revocation List (*.crl).
  • Browse to the location of the RootNavServiceCA.crl file, select the file, and then choose Open.
  • On the File to Import page, choose Next.
  • On the Certificate Store page, accept the default selection, and then choose Next.
  • On the Completing the Certificate Import Wizard page, choose Finish.

Certificate-11

  • Select the Trusted Root Certificate Authorities node, and then refresh the snap-in.

A Certificate Revocation List folder that contains the RootNavServiceCA.crl file has been created.
Certificate-12
In next step we will now create and install a test certificate on computer running Microsoft Dynamics NAV Server.

Next Step Link- How to create and install a test certificate for the Microsoft Dynamics NAV Server computer