MicroStrategy ONE

Integrate MicroStrategy with Google BigQuery for Single Sign-On Using Google

Starting in MicroStrategy ONE (September 2024), MicroStrategy supports single sign-on to Google BigQuery using OpenID through Google in all clients out-of-the-box.

Check out the following topics to enable single sign-on using Google:

Integrate MicroStrategy with Google Using OIDC

To set up OIDC login with Google, see Integrate OIDC Support with Google.

If you want to access BigQuery data, add a https://www.googleapis.com/auth/bigquery scope to each client.

Create and Map a MicroStrategy User to a Google User

  1. Open the Workstation window with the Navigation pane in smart mode.
  2. In the Navigation pane, click Environments.
  3. Log into your environment. You must have the Administrator privileges.
  4. In the Navigation pane, click Users and Groups.
  5. Click the plus icon (+) next to All Users and enter the required fields.
  6. In the left pane, click Privileges and add the following privileges:
    • Access data from Databases, Google BigQuery, BigData, OLAP, BI tools
    • Create and edit database instances and connections
    • Create and edit database logins
    • Create configuration objects
    • Create dataset in Workstation
    • Monitor Database Connections
    • Use Workstation
  7. In the left pane, click Authentication.
  8. Enter your Google email address in Trusted Authenticated Request User ID.
  9. Click Save.

For more information on mapping existing users, see Mapping OIDC Users to MicroStrategy.

Create an Enterprise Security Object

  1. In the Navigation pane, click , next to Enterprise Security.

  2. Choose the Environment in which you want to create the object.

  3. Give the IAM object a Display Name.

  4. Select the Google IdP type and register the MicroStrategy environment as an application with the provided Login Redirect URIs.

  5. In the Workstation drop-down, enter the Client ID for each client that you created in the previous step.

    Click Client Type to add a different client type.

  6. Enter the Client Secret for Web and Workstation.

    Client Secret is not required for iOS and Android.

  7. Leave Scope blank.

  8. Click Save.

For more information on creating security objects, see Manage OAuth Enterprise Security with Identity and Access Management (IAM) Objects.

Create a Google BigQuery JDBC or ODBC Data Source

  1. Open the Workstation window.
  2. In the Navigation pane, click , next to Data Sources.

  3. Choose Google BigQuery.

  4. Enter a Name.

  5. Expand the Default Database Connection drop-down and click Add New Database Connection.

  6. Enter a Name.

  7. Choose a JDBC or ODBC driver and enter the required information.

  8. In Authentication Service, choose the security object you created in the section above.

  9. Click Save.

  10. Select the Projects to which the data source is assigned and can be accessed.

  11. Click Save.

Test the Google BigQuery Data Source

  1. Open the Workstation window.
  2. Check that the environment is using the Default OIDC authentication mode:

    1. Click Environments in the Navigation pane.

    2. Right-click the environment you want to use and choose Edit Environment Information.

    3. Check the Authentication Mode is set to Default OIDC.

  3. Log in to your MicroStrategy environment using your Google username and password.

  4. To test the data source in Library and ensure it displays:

    1. Open MicroStrategy Library and click Log in with OIDC.

    2. In the toolbar, click , and choose Dashboard.

    3. Click Blank Dashboard.

    4. Click Create.

    5. Click New Data and select the Google BigQuery gateway.

    6. Choose Select Tables and click Next.

    7. Select the data source you created.

  5. To test the data source in Workstation and ensure it displays:

    1. In the Navigation pane, click , next to Dataset.

    2. Select the Google BigQuery gateway.

    3. Select the data source you created.

Known Limitations

Google BigQuery drivers do not support refresh token authentication modes without a client secret. Therefore, the connection on iOS and Android may fail. You can skip the two clients when configuring Enterprise Security and MicroStrategy will use the client information configured for Web to retrieve the refresh token to connect.