Strategy One

Import Data from Microsoft Analysis Services

Starting in Strategy One (February 2026), enhanced Microsoft Analysis Services (MSAS) security is enabled out-of-the-box.

Strategy One (January 2026) adds a preview feature for enhanced security for Microsoft Analysis Services (MSAS) integrations. You can validate OIDC tokens on the Internet Information Services (IIS) and MDX cube provider after you have been validated in Entra ID.

Enable the Preview Feature

You should only perform the following steps if you are using Strategy One (January 2026).

  1. Open the Workstation window.

  2. Log in to your environment.

  3. Click Help and enable Preview Features.

Configure the MDX Cube Provider

  1. Install and configure the MDX cube provider using the steps in Install and Configure Analysis Services and the MDX Cube Provider.

  2. Disable Anonymous Authentication for the application. For more information on disabling anonymous authentication, see Anonymous Authentication.

  3. Add the following additional fields to the datasources.xml file in the application folder:

    Copy
        <ValidationInterval>30</ValidationInterval>
        <ValidationType>OIDC</ValidationType>
        <OIDCIssuer><https://login.microsoftonline.com/${tenant_ID}/v2.0</OIDCIssuer>>
        <OIDCUserInfo><https://graph.microsoft.com/oidc/userinfo</OIDCUserInfo>>

Configure the MDX Cube Provider

  1. Set up the MDX cube provider using the steps in Install and Configure Analysis Services and the MDX Cube Provider.

  2. Disable the Anonymous Authentication for this application.

  3. Add any additional fields in the datasources.xml file in the folder of the application:

    • ValidationType: Specifies the additional validation mechanism used by the MDX cube provider. The following values are supported:

      • OIDC

        • The MDX Cube Provider calls the OIDC provider's UserInfo endpoint to retrieve the user's claims.

        • The effective user name is replaced by a specific property taken from the UserInfo claims.

        • You must configure OIDCIssuer or OIDCUserInfo

          High level workflow: Intelligence sever > MDX Cube Provider > OIDC UserInfo endpoint > Claims returned > Effective user name updated

      • OIDC_OFFLINE

        • The MDX Cube Provider does not call the UserInfo endpoint.

        • Instead, it validates the provided OIDC ID token locally, according to standard JWT rules (signature, expiration, issuer, etc.)

        • The effective user name is replaced by a specific property extracted from the ID token claims.

        • When this type is set, OIDCIssuer is mandatory.

        • It is used to validate the iss (issuer) claim of the ID token and to obtain the issuer's metadata (for example, JWKS).

          This mode does not depend on online access to the UserInfo endpoint.

    • ValidationInterval

      • Meaning: Timeout for requests between Intelligence Server and the MDX Cube Provider.

      • Unit: seconds.

      • Default: 30 seconds.

      • This setting is only effective when ValidationType is set to a valid value (for example, OIDC or OIDC_OFFLINE).

    • OIDCIssuer

      • Meaning: The issuer URL of the OIDC provider (corresponds to the issuer field in the OIDC configuration).

      • Usage: Typically used to obtain the OIDC discovery document (usually located in /.well-known/openid-configuration) and JWKS, authorization endpoints, and more.

      • Requirement: This field is required when ValidationType = "OIDC_OFFLINE".

    • OIDCUserInfo

      • Meaning: The UserInfo endpoint URL of the OIDC provider.

      • Usage: When ValidationType = "OIDC", the MDX Cube Provider sends requests to this endpoint to retrieve user claims.

      • How to obtain: Usually from the issuer's OIDC discovery document, for example, the JSON at https://<issuer>/.well-known/openid-configuration, the field userinfo_endpoint:

        Copy
        <ValidationInterval>30</ValidationInterval>
        <ValidationType>OIDC</ValidationType>
        <OIDCIssuer><https://login.microsoftonline.com/${tenant_ID}/v2.0</OIDCIssuer>>
        <OIDCUserInfo><https://graph.microsoft.com/oidc/userinfo</OIDCUserInfo>>

Configure the Intelligence Server and Workstation

  1. Configure OIDC with Entra ID using the steps in Integrate OIDC support with Microsoft Entra ID.

  2. Create an identity and access management object using the steps in Manage OAuth Enterprise Security with Identity and Access Management (IAM) Objects.

  3. Create a database instance using the following steps:

    1. Open the Workstation window.
    2. In the Navigation pane, click , next to Data Sources.
    3. Click Microsoft Analysis Services.

    4. Type a Name.

    5. Expand the Default Database Connection drop-down list and click Add New Database Connection.

    6. Type a Name.

    7. Expand the Driver drop-down list and choose a Driver.

    8. Enter your URL, Data Source Information, and Catalog.

    9. Expand the Default Database Login.

    10. Choose an existing login or click New Database Login.

      Ensure the login you select or create is a user that can access the MDX cube provider you configured above.

    11. Select the check box next to Enable OIDC validation on effective user name.

    12. Expand the Authentication Service drop-down list and choose the IAM object you created in step 2.

    13. Select the check box next to Enable SSAS database authentication.

    14. Enter the User and Password for the SSAS power user.

      If a user wants to use effectiveUserName, add the additional parameters to the connection string. EffectUserName=email.

    15. Click Save.

    16. Click Save.

Import Data

  1. Open the Workstation window.
  2. In the Navigation pane, click , next to Datasets.

  3. Select your environment and project, Data Import Cube, and click OK.

  4. In Data Catalog, expand the OLAP section.

  5. Expand your MSAS data source and double-click cubes or drag them into the right pane.

  6. View the cubes to import in the right pane.

  7. Click Save.

  8. In Browse Catalog, expand the cube and drag the tables you want to add into the right pane.

  9. If you want to use hierarchy reporting, select the check box next to Import hierarchy as hierarchical attribute.

    For more information on hierarchical attributes, see Import Hierarchical Attributes.

  10. Click Finish.