Yarken Help Centre

Creating a new Pipeline Connection

Prerequisites (Tenant-level)

  • For the Google API,

    • You must be a Google Workspace Super Admin for your domain.

    • The following APIs might be disabled as part of your Tenant's security compliance. Make sure they are enabled before integration:

      • Admin SDK API

      • Enterprise License Manager API

  • For Microsoft Graph and Power BI API, you should have

    • A Microsoft Entra (Azure AD) tenant.

    • A Global Administrator or Privileged Role Administrator to grant tenant-wide admin consent for application permissions.

    • A pre-configured admin user to configure the Pipelines for fetching app usage reports.

    • In Power BI-specific flows:

      • A Power BI Tenant Admin and the ability to change Tenant settings in the Power BI Admin portal.

      • Following special configurations. For more information, refer Configure Power BI–specific requirements for Pipeline connections.

        • Create a Microsoft Entra Security Group (e.g., Power BI).

        • Add an application (e.g., Yarken Power BI) as a member to the Power BI group.

        • Enable the service principals access (read-only) in PBI Tenant Admin portal.

Procedure

Use the procedure below to create the API connections automatically for Microsoft Graph API, Power BI API, Google API, and Google Reseller API.

To create,

  1. Navigate to Settings > Pipelines > Connections.

  2. Click + NEW CONNECTION.

  3. Choose any API connection Type, for example, Microsoft Graph API.

In the Authentication type, the Platform Credentials are auto-selected for Microsoft Graph and Power BI API.

  1. Choose one of the options for configuring API:

    1. Option 1, CONNECT API — allows you to immediately connect to API using in-app OAuth flow. The CONNECT API button name varies based on connection type you selected, for example, CONNECT MICROSOFT GRAPH API, CONNECT POWER BI API, or CONNECT GOOGLE API.

      1. Click CONNECT button.

      2. Sign in with the your cloud provider specific credential account and grant the requested permissions.

      3. Once accepted, you will be redirected to YäRKEN, and the required permissions should have been granted.

    2. Option 2, COPY CONSENT URL — allows you to copy and share the consent URL to authorize via email or another device. This option is ideal for team admins or offline setup.

      1. Click COPY CONSENT URL.

      2. Paste the URL into a browser on the other device (or send it to the admin who will perform consent).

      3. Complete sign-in and grant admin consent.

      4. Once accepted, you will be redirected to YäRKEN, and the required permissions should have been granted.

  2. Verify that the option to create a pipeline and fetch data instantly is checked.

The application creates a connection and its associated pipeline.

Create API Connection manually

Note: The Google API connection cannot be created manually. It must be configured through a consent URL. Manual API connections are supported only for Microsoft Graph and Power BI.

Use the procedure below to create the API connections manually for Microsoft Graph and Power BI API.

Prerequisites

When creating an API connection manually, you must have:

  • Tenant Id, Client Id, and Client Secret

Procedure

To create,

  1. Navigate to Settings > Pipelines > Connections.

  2. Click + NEW CONNECTION.

  3. Choose Microsoft Graph or Power BI API connection Type.

  4. In the Authentication Type, select Custom Credentials from the drop-down list.

  5. On Create a new connection dialog box, enter the details below:

    1. Name: The name of the connection.

    2. Tenant Id: The unique identifier of your Azure Active Directory tenant.

    3. Tenant Name: The name of your Azure Active Directory tenant.

    4. Client Id: The unique identifier for your Azure AD application (App Registration).

    5. Client Secret: The secret key used to authenticate your application with the Microsoft Graph API.

  6. Click TEST CONNECTION to validate credentials.

  7. If the test passes, click SAVE.

Create Cloud Storage Connection (manual only)

Use the procedure below to create the cloud storage connections for Azure Blob Storage, AWS S3, and Google Storage.

Prerequisites

Before you begin, you should have:

  • For Azure Blog Storage - Account Name, Access Key, and Container Name

  • For AWS S3 or Google Storage - Access Key, Secret Key, and Bucket Name

Procedure

To create,

  1. Navigate to Settings > Pipelines > Connections.

  2. Click + NEW CONNECTION.

  3. Choose any storage Connection Type, for example, Azure Blob Storage.

  4. On Create a new connection dialog box, enter the details below (field name varies by storage type):

    1. Name: The name of the connection.

    2. Account Name: The name of the account used to authenticate and authorize access to the storage service.

    3. Access Key: A secret key associated with the account used to authenticate and authorize secure access to the storage service.

    4. Secret Key: A secret key associated with the access key used to authenticate and authorize secure access to the storage service.

    5. Container/Bucket Name: The name of the container/bucket used to store files or objects in a cloud storage service.

  5. Click TEST CONNECTION to validate credentials.

  6. If the test passes, click SAVE.

The connection is defined in the application. Use this connection for configuring the cloud storage pipelines.


Next steps


Related content