January 12, 2026 at 5:15 pm
Hi everyone,
Below is a consolidated summary of what we validated
Architecture & data path
The on-premises data resides in SQL Server, accessed by Power BI Service via on-premises Analysis Services (SSAS Tabular).
Effective flow:
Power BI Service ? Power BI Gateway ? SSAS Tabular ? SQL Server
The issue is not SQL connectivity, but authentication and delegation at the Gateway ? SSAS layer.
Authentication behavior & EffectiveUserName
We confirmed:
When switching authentication to enable impersonation:
Key conclusion: If a fixed Windows user is stored on the SSAS data source, Kerberos delegation will never trigger, even if delegation is perfectly configured.
This explains why: Kerberos is not observed end-to-end, user impersonation never occurs and the technical user is always resolved
TLS certificate chain & transport trust (first blocking layer)
“The certificate chain was issued by an authority that is not trusted.”
Because SSO/OAuth-based connections are stricter than Windows auth, TLS trust must be fully validated before delegation can succeed.
We need to confirm:
Federation & identity (second blocking layer)
Once TLS is confirmed clean, EffectiveUserName depends on:
Apart from this long list, is there anything else where this could be failing?
Viewing post 1 (of 1 total)
You must be logged in to reply to this topic. Login to reply