Configure Kerberos-based SSO from Power BI service to on-premises data sources
Enabling SSO makes it easy for Power BI reports and dashboards to refresh data from on-premises sources while respecting user-level permissions configured on those sources. Use Kerberos constrained delegation to enable seamless SSO connectivity.
Several items must be configured for Kerberos constrained delegation to work properly, including Service Principal Names (SPN) and delegation settings on service accounts.
Install and configure the Microsoft on-premises data gateway
The on-premises data gateway supports an in-place upgrade, and settings takeover of existing gateways.
Run the gateway Windows service as a domain account
In a standard installation, the gateway runs as the machine-local service account, NT Service\PBIEgwService.
To enable Kerberos constrained delegation, the gateway must run as a domain account, unless your Azure Active Directory (Azure AD) instance is already synchronized with your local Active Directory instance (by using Azure AD DirSync/Connect). To switch to a domain account, see change the gateway service account.
If Azure AD Connect is configured and user accounts are synchronized, the gateway service doesn't need to perform local Azure AD lookups at runtime. Instead, you can simply use the local service SID for the gateway service to complete all required configuration in Azure AD. The Kerberos constrained delegation configuration steps outlined in this article are the same as the configuration steps required in the Azure AD context. They are applied to the gateway's computer object (as identified by the local service SID) in Azure AD instead of the domain account.
Obtain domain admin rights to configure SPNs (SetSPN) and Kerberos constrained delegation settings
To configure SPNs and Kerberos delegation settings, a domain administrator should avoid granting rights to someone that doesn't have domain admin rights. In the following section, we cover the recommended configuration steps in more detail.
Configure Kerberos constrained delegation for the gateway and data source
If necessary, configure an SPN for the gateway service domain account as a domain administrator and configure delegation settings on the gateway service domain account.
Configure an SPN for the gateway service account
First, determine whether an SPN was already created for the domain account used as the gateway service account:
As a domain administrator, launch the Active Directory Users and Computers Microsoft Management Console (MMC) snap-in.
In the left pane, right-click the domain name, select Find, and then enter the account name of the gateway service account.
In the search result, right-click the gateway service account and select Properties.
If the Delegation tab is visible on the Properties dialog, then an SPN was already created and you can skip to Decide on the type of Kerberos constrained delegation to use.
If there isn't a Delegation tab on the Properties dialog box, you can manually create an SPN on the account to enable it. Use the setspn tool that comes with Windows (you need domain admin rights to create the SPN).
For example, suppose the gateway service account is Contoso\GatewaySvc and the gateway service is running on the machine named MyGatewayMachine. To set the SPN for the gateway service account, run the following command:
setspn -a gateway/MyGatewayMachine Contoso\GatewaySvc
You can also set the SPN by using the Active Directory Users and Computers MMC snap-in.
Decide on the type of Kerberos constrained delegation to use
You can configure delegation settings for either standard Kerberos constrained delegation or resource-based Kerberos constrained delegation. Use resource-based delegation (requires Windows Server 2012 or later) if your data source belongs to a different domain than your gateway. For more information on the differences between the two approaches to delegation, see Kerberos constrained delegation overview.
Depending on which approach you want to use, proceed to one of the following sections. Don't complete both sections:
- Configure the gateway service account for standard Kerberos constrained delegation
- Configure the gateway service account for resource-based Kerberos constrained delegation.
Configure the gateway service account for standard Kerberos constrained delegation
Complete the steps in this section if you want to enable standard Kerberos constrained delegation. Otherwise, if you want to enable resource-based Kerberos constrained delegation, complete the steps in Configure the gateway service account for resource-based Kerberos constrained delegation.
We'll now set the delegation settings for the gateway service account. There are multiple tools you can use to perform these steps. Here, we'll use the Active Directory Users and Computers MMC snap-in to administer and publish information in the directory. It's available on domain controllers by default; on other machines, you can enable it through Windows feature configuration.
We need to configure Kerberos constrained delegation with protocol transiting. With constrained delegation, you must be explicit about which services you allow the gateway to present delegated credentials to. For example, only SQL Server or your SAP HANA server accepts delegation calls from the gateway service account.
This section assumes you have already configured SPNs for your underlying data sources (such as SQL Server, SAP HANA, SAP BW, Teradata, or Spark). To learn how to configure those data source server SPNs, refer to the technical documentation for the respective database server and see the section What SPN does your app require? in the My Kerberos Checklist blog post.
In the following steps, we assume an on-premises environment with two machines in the same domain: a gateway machine and a database server running SQL Server that has already been configured for Kerberos-based SSO. The steps can be adopted for one of the other supported data sources, so long as the data source has already been configured for Kerberos-based single sign-on. For this example, we'll use the following settings:
- Active Directory Domain (Netbios): Contoso
- Gateway machine name: MyGatewayMachine
- Gateway service account: Contoso\GatewaySvc
- SQL Server data source machine name: TestSQLServer
- SQL Server data source service account: Contoso\SQLService
Here's how to configure the delegation settings:
With domain administrator rights, open the Active Directory Users and Computers MMC snap-in.
Right-click the gateway service account (Contoso\GatewaySvc), and select Properties.
Select the Delegation tab.
Select Trust this computer for delegation to specified services only > Use any authentication protocol.
Under Services to which this account can present delegated credentials, select Add.
In the new dialog box, select Users or Computers.
Enter the service account for the data source, and then select OK.
For example, a SQL Server data source can have a service account like Contoso\SQLService. An appropriate SPN for the data source should have already been set on this account.
Select the SPN that you created for the database server.
In our example, the SPN begins with MSSQLSvc. If you added both the FQDN and the NetBIOS SPN for your database service, select both. You might see only one.
You should now see the SPN in the list of services to which the gateway service account can present delegated credentials.
To continue the setup process, proceed to Grant the gateway service account local policy rights on the gateway machine.
Configure the gateway service account for resource-based Kerberos constrained delegation
Complete the steps in this section if you want to enable resource-based Kerberos constrained delegation. Otherwise, if you want to enable standard Kerberos constrained delegation, complete the steps in Configure the gateway service account for standard Kerberos constrained delegation.
You use resource-based Kerberos constrained delegation to enable single sign-on connectivity for Windows Server 2012 and later versions. This type of delegation permits front-end and back-end services to be in different domains. For it to work, the back-end service domain needs to trust the front-end service domain.
In the following steps, we assume an on-premises environment with two machines in different domains: a gateway machine and a database server running SQL Server that has already been configured for Kerberos-based SSO. These steps can be adopted for one of the other supported data sources, so long as the data source has already been configured for Kerberos-based single sign-on. For this example, we'll use the following settings:
- Active Directory frontend Domain (Netbios): ContosoFrontEnd
- Active Directory backend Domain (Netbios): ContosoBackEnd
- Gateway machine name: MyGatewayMachine
- Gateway service account: ContosoFrontEnd\GatewaySvc
- SQL Server data source machine name: TestSQLServer
- SQL Server data source service account: ContosoBackEnd\SQLService
Complete the following configuration steps:
Use the Active Directory Users and Computers MMC snap-in on the domain controller for the ContosoFrontEnd domain and verify no delegation settings are applied for the gateway service account.
Use Active Directory Users and Computers on the domain controller for the ContosoBackEnd domain and verify no delegation settings are applied for the back-end service account.
In the Attribute Editor tab of the account properties, verify that the msDS-AllowedToActOnBehalfOfOtherIdentity attribute isn't set.
In Active Directory Users and Computers, create a group on the domain controller for the ContosoBackEnd domain. Add the GatewaySvc gateway service account to the ResourceDelGroup group.
Open a command prompt and run the following commands in the domain controller for the ContosoBackEnd domain to update the msDS-AllowedToActOnBehalfOfOtherIdentity attribute of the back-end service account:
$c = Get-ADGroup ResourceDelGroup Set-ADUser SQLService -PrincipalsAllowedToDelegateToAccount $c
In Active Directory Users and Computers, verify that the update is reflected in the Attribute Editor tab in the properties for the back-end service account.
Grant the gateway service account local policy rights on the gateway machine
Finally, on the machine running the gateway service (MyGatewayMachine in our example), grant the gateway service account the local policies Impersonate a client after authentication and Act as part of the operating system (SeTcbPrivilege). Perform this configuration with the Local Group Policy Editor (gpedit.msc).
On the gateway machine, run gpedit.msc.
Go to Local Computer Policy > Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.
Under User Rights Assignment, from the list of policies, select Impersonate a client after authentication.
Right-click the policy, open Properties, and then view the list of accounts.
The list must include the gateway service account (Contoso\GatewaySvc or ContosoFrontEnd\GatewaySvc depending on the type of constrained delegation).
Under User Rights Assignment, select Act as part of the operating system (SeTcbPrivilege) from the list of policies. Ensure that the gateway service account is included in the list of accounts.
Restart the On-premises data gateway service process.
Set user-mapping configuration parameters on the gateway machine (if necessary)
If you don't have Azure AD Connect configured, follow these steps to map a Power BI service user to a local Active Directory user. Each Active Directory user mapped in this way needs to have SSO permissions for your data source. For more information, see Guy in a Cube video.
Open the main gateway configuration file, Microsoft.PowerBI.DataMovement.Pipeline.GatewayCore.dll. By default, this file is stored at C:\Program Files\On-premises data gateway.
Set ADUserNameLookupProperty to an unused Active Directory attribute. We'll use
msDS-cloudExtensionAttribute1in the steps that follow. This attribute is available only in Windows Server 2012 and later.
Set ADUserNameReplacementProperty to
SAMAccountNameand then save the configuration file.
From the Services tab of Task Manager, right-click the gateway service and select Restart.
For each Power BI service user you want to enable Kerberos SSO for, set the
msDS-cloudExtensionAttribute1property of a local Active Directory user (with SSO permission to your data source) to the full username (UPN) of the Power BI service user. For example, if you sign in to Power BI service as email@example.com and you want to map this user to a local Active Directory user with SSO permissions, say, test@LOCALDOMAIN.COM, set this user's
msDS-cloudExtensionAttribute1attribute to firstname.lastname@example.org.
You can set the
msDS-cloudExtensionAttribute1property with the Active Directory Users and Computers MMC snap-in:
As a domain administrator, launch Active Directory Users and Computers.
Right-click the domain name, select Find, and then enter the account name of the local Active Directory user to map.
Select the Attribute Editor tab.
msDS-cloudExtensionAttribute1property, and double-click it. Set the value to the full username (UPN) of the user you use to sign in to the Power BI service.
Select Apply. Verify that the correct value has been set in the Value column.
Complete data source-specific configuration steps
SAP HANA and SAP BW have additional data-source specific configuration requirements and prerequisites that you need to meet before you can establish an SSO connection through the gateway to these data sources. For more information, see SAP HANA configuration and the SAP BW - CommonCryptoLib (sapcrypto.dll) configuration page. Although it's possible to configure SAP BW for use with the gx64krb5 SNC library, this library isn't recommended because it's no longer supported by SAP. You should use CommonCryptoLib or gx64krb5 as your SNC library. Don't complete the configuration steps for both libraries.
Although other SNC libraries might also work for BW SSO, they aren't officially supported by Microsoft.
Run a Power BI report
After you complete all the configuration steps, use the Manage Gateway page in Power BI to configure the data source to use for SSO. If you have multiple gateways, ensure that you select the gateway you've configured for Kerberos SSO. Then, under Advanced Settings for the data source, ensure Use SSO via Kerberos for DirectQuery queries is checked.
Publish a DirectQuery-based report from Power BI Desktop. This report must use data that is accessible to the user that's mapped to the (Azure) Active Directory user that signs in to the Power BI service. Because of how refresh works, you must use DirectQuery instead of import. When the gateway refreshes import-based reports, it uses the credentials that you entered in the Username and Password fields when you created the data source. In other words, Kerberos SSO is not used. When you publish, select the gateway you've configured for SSO if you have multiple gateways. In the Power BI service, you can now refresh the report or create a new report based on the published dataset.
This configuration works in most cases. However, with Kerberos there can be different configurations depending on your environment. If the report won't load, contact your domain administrator to investigate further. If your data source is SAP BW, refer to the troubleshooting sections of the data source-specific configuration pages for CommonCryptoLib and gx64krb5/gsskrb5, depending on which SNC library you've chosen.
For more information about the on-premises data gateway and DirectQuery, see the following resources: