Connecting Power BI to SSAS and effective user not working

  • Hi everyone,

    Below is a consolidated summary of what we validated

    Architecture & data path

    The on-premises data resides in SQL Server, accessed by Power BI Service via on-premises Analysis Services (SSAS Tabular).

    Effective flow:

    Power BI Service ? Power BI Gateway ? SSAS Tabular ? SQL Server

    The issue is not SQL connectivity, but authentication and delegation at the Gateway ? SSAS layer.

    Authentication behavior & EffectiveUserName

    We confirmed:

    • When Windows authentication with a fixed domain user is configured on the SSAS data source, the dataset loads and reports are visible.
    • In this mode, EffectiveUserName is bypassed by design.
    • SSAS always resolves the technical account, regardless of the interactive user.

    When switching authentication to enable impersonation:

    • The dataset becomes unavailable in the report.

    Key conclusion: If a fixed Windows user is stored on the SSAS data source, Kerberos delegation will never trigger, even if delegation is perfectly configured.

    This explains why: Kerberos is not observed end-to-end, user impersonation never occurs and the technical user is always resolved

    TLS certificate chain & transport trust (first blocking layer)

    • We reviewed certificate stores on both the gateway and data source servers.
    • Root and intermediate CAs appear to be present on both sides. However, earlier connection errors explicitly referenced:

      “The certificate chain was issued by an authority that is not trusted.”

      Because SSO/OAuth-based connections are stricter than Windows auth, TLS trust must be fully validated before delegation can succeed.

    We need to confirm:

    • Confirm the exact certificate used by SQL Server / SSAS for TLS.
    • Ensure the full certificate chain (Root + Intermediate CAs) is trusted on the gateway server.
    • Validate EKUs (Server Authentication) and certificate expiry.
    • Retest connectivity after confirming full chain trust.
    • Until TLS trust is unequivocally clean, delegation troubleshooting cannot reliably progress.

    Federation & identity (second blocking layer)

    Once TLS is confirmed clean, EffectiveUserName depends on:

    • AD ? Entra ID (Azure AD) federation and synchronisation
    • Correct UPN suffix alignment

    Apart from this long list, is there anything else where this could be failing?

    Paul Hernández
  • Thanks for posting your issue and hopefully someone will answer soon.

    This is an automated bump to increase visibility of your question.

  • With what you confirmed through testing, I would personally confirm in logs. There should be a log on one of the systems (gateway, SSAS, SQL) that indicates what the problem is. Trying to fix a problem like that when there are 4 points that need to be investigated, the first step is to determine where the problem is. Is the problem from web to gateway, gateway to SSAS, or SSAS to SQL when doing the impersonation. You confirmed that one of those is broken, but which one? It may be something as trivial as making sure your SPN's are set up correctly, or it could be one of the issues you listed.

    BUT the very very first step is to determine where things are breaking down. Throwing every solution you are aware of at the problem MAY resolve things but it may end up being overkill. Review the logs, find the specific source of the problem and resolve that point first then work on the next one until all of them are resolved.

    It sounds like the SSL certs are not trusted and fixing that is a pretty easy thing to do - add the root CA and intermediate CA to the local computer trusted root certificate store. But that fix probably needs to happen on the gateway, SSAS, and the SQL instance. Possibly even on the cloud side if you can configure that. Alternately, since you are connecting internal systems to external, you may need to get a certificate from a CA trusted by the cloud provider.

    As for other things that could be failing, I'm sure there are more. Permissions (for example) for the account that is connecting to the systems for example. If userA has no permissions on SSAS but full control on Power BI, things could fail. And I'm sure there are other things. Depending on how certificates are handled, if they expire too far in the future, some systems will consider the expiration date invalid and thus the certificate invalid. So that is another consideration.

    The above is all just my opinion on what you should do. 
    As with all advice you find on a random internet forum - you shouldn't blindly follow it.  Always test on a test server to see if there is negative side effects before making changes to live!
    I recommend you NEVER run "random code" you found online on any system you care about UNLESS you understand and can verify the code OR you don't care if the code trashes your system.

Viewing 3 posts - 1 through 3 (of 3 total)

You must be logged in to reply to this topic. Login to reply