
Microsoft OneDrive at IU, SharePoint Online, Microsoft Teams at IU: These three options are related, and if your department is already using one of them, it may be the easiest to choose to save your PBIX files in a folder inside of one of these systems.There is currently no standardized process at IU for how you should store these files, but here are some options that range from simple to complex:

The most important reason for this is to be able to roll back to a previous version if some change produces unwanted results. UITS strongly recommends that your source files (PBIX reports as well as templates and themes) be stored somewhere that implements version control. Version control, also known as source control or revision control, is the practice of tracking and managing changes to software code, documents, or other collections of information.

Power BI Pro users publishing content to share with other Pro users on campus should request the creation of an App workspace see Request a Power BI workspace. Users on non-Windows platforms can use the Power BI Desktop tool in IUanyWare. For a discussion on your goals to help determine the best Premium licensing option, contact startedĭownload the Power BI Desktop application for Windows from the Microsoft store.

Individual licensing: Power BI Pro licenses are automatically assigned to all IU faculty and staff.This license allows sharing of data, reports, and dashboards in an App workspace with other Pro users. To view all the content available to you here, use the green Log in button at the top of this page to log into the Knowledge Base.Īs part of IU's agreement with Microsoft, Power BI Pro may be assigned to certain individuals at IU. Physical, and technical safeguards that complement those UITS already has in place. You may use this system or service for work involving data that contain PHI only if you institute additional administrative, However, using this system or service does not fulfill your legal responsibilities for protecting the privacy and security of data that contain PHI. This UITS system or service meets certain requirements established in the HIPAA Security Rule thereby enabling its use for work involving data that contain protected health information ( PHI).
