Introduction
This blog provides a comprehensive, step-by-step guide for configuring an Azure SQL Database hosted on Azure Cloud with IBM Cognos Analytics using the JWT authentication method. Before proceeding, it’s essential to have an OIDC namespace already set up in Cognos Analytics, as this is a prerequisite for JWT authentication. This blog assumes that the OIDC authentication namespace has been configured, so it will not cover that topic in detail. If you have not yet set up an OIDC namespace, please refer to the following documentation:
How to Configure Cognos Analytics 11.2.x with Microsoft Azure OIDC.
In this blog, we will use Azure (Microsoft Entra) as the OpenID Connect (OIDC) provider to perform JWT authentication with Cognos Analytics. If you are using a different OIDC provider, please consult the relevant vendor's documentation for guidance on integrating JWT authentication with Cognos.
While this tutorial focuses on integrating Azure SQL with Cognos Analytics using JWT, it's important to note that other configurations and providers may deliver similar results depending on your organization's needs. Though this guide outlines a specific approach, it is not the only method available for such integrations.
Overview
Technology/Applications Covered:
- IBM Cognos Analytics 12.0.4
- Microsoft Entra as the authentication namespace
- Azure SQL Database
Prerequisites
- A Microsoft Entra account
- Cognos Analytics server configured with an Azure authentication namespace
Content Overview
A) Configuring API permissions to support requests from Azure SQL
B)Authenticating into Cognos Analytics Using the Azure Authentication Namespace
C)Configuring Dataserver connection in Cognos Analytics for JWT Authentication
Detailed Configuration Steps
A) Configuring API permissions to support requests from Azure SQL
Inorder to get started with configuring an Azure SQL Database with Cognos Analytics we need to first configure the correct API permissions/scope 'user_impersonation' for the application created for authentication with Cognos. such that the scope provides enough access for the particular service API on behalf of the signed user.
To proceed with adding user_impersonation permission to the application navigate to Appregistration and select the Application created for Cognos as shown below:
B)Authenticating with Cognos Analytics Using the Azure Authentication Namespace
With the API permissions for Azure SQL configured and the web application for Cognos Analytics registered in Azure, we can now authenticate into the Cognos portal using the Azure authentication namespace, which utilizes the same client ID set during the application registration.
C)Configuring Dataserver connection in Cognos Analytics for JWT Authentication
After successfully authenticating into the Cognos portal via the Azure namespace, the next step is to configure the Data Server connection in Cognos for Azure SQL, as outlined in the implementation steps below.