You can whitelist the IP of Power Query Online that MSFT provides for the region in which the Dataflow is created in.
https://www.microsoft.com/en-us/download/details.aspx?id=56519
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
We faced an issue where Power BI Dataflows were unable to connect to Azure Analysis Services when the firewall was enabled, showing a “credential is invalid” error. Please find the error below:
However, the same credentials work correctly when the firewall is disabled, and Power BI reports/Semantic Model connect successfully even with the firewall turned on.
As per the above image PowerBi services shall be accessed when Firewall is enables but the DataFlow give error whereas the semantic models work fine.
Can someone suggest any resolution for the same
You can whitelist the IP of Power Query Online that MSFT provides for the region in which the Dataflow is created in.
https://www.microsoft.com/en-us/download/details.aspx?id=56519
Hello somyasri!
Thanks for the update. That’s good that whitelisting PowerQueryOnline.WestUS IPs resolved the issue. It makes perfect sense why you'd have these questions.
To answer your following questions,
1. Why did whitelisting West US IPs solve it, when your tenant is in "United States" and AAS is in North Europe?
Think of it like this: Even though your Power BI is generally in the "United States" region, the specific engine that runs your Dataflow refreshes (Power Query Online) is a massive, distributed service. For connections heading outside the US, or simply due to how their internal network routes traffic for efficiency, your dataflow's outbound connection ended up physically exiting Microsoft's network through a datacentre in West US. It acts as a dedicated "exit point" for those types of connections.
2. How to ensure you're consistently whitelisting the correct IP ranges for reliable Dataflow connectivity?
The best way is to use Azure Service Tags. Microsoft manages these tags, so when their internal IPs change or new exit points appear, the tag updates automatically, and your firewall rules stay correct.
For more information, please refer the following links
Service Tags:
https://learn.microsoft.com/en-us/azure/virtual-network/service-tags-overview
AAS FAQs:
I hope this helps. Let me know if you have any further questions or need additional assistance.
Also, if these answers your query, do click the "Accept the answer" which might be beneficial to other community members reading this thread.