Creating the Data Source Name
This section describes how to edit the DSN configuration and then authenticate and connect to Apache CouchDB APIs.
DSN Configuration
You can use the Microsoft ODBC Data Source Administrator to edit the DSN configuration. Note that the installation process creates a both a user DSN and a system DSN, as described in Installing the Connector.
Note: The connector stores connection information in the Windows registry. To ensure that the connector can write to the registry, either run Power BI as an administrator or use a User DSN for your connection instead of a System DSN.
User DSN
Complete the following steps to edit the DSN configuration:
- Select Start > Search, and enter ODBC Data Sources in the Search box.
- Choose the version of the ODBC Administrator that corresponds to the bitness of your Power BI Desktop installation (32-bit or 64-bit).
- Select the system data source and click Configure.
- Edit the information on the Connection tab and click OK.
System DSN
Configure the system DSN the same way as the user DSN, except you will need to switch to the System DSN tab before performing Step 3.
Connecting to Apache CouchDB
Apache CouchDB supports three types of authentication:- Basic: Basic username/password authentication.
- JWT: Authentication with JWT token.
- None: Anonymous access for databases that are public.
If you want your users (or JWT tokens) to have access to only specific databases, you have to configure the admin_only_all_dbs option in the Apache CouchDB instance to grant all users access to the "/_all_dbs" endpoint which is required by the connector for listing tables. Otherwise the connector won't be able to connect, because the endpoint will throw an authentication error.
Basic Authentication
Set the following to connect to data:
- AuthScheme: Basic.
- Url: The Url of your Apache CouchDB instance. For example: http://localhost:5984
- User The Apache CouchDB user account used to authenticate.
- Password The Apache CouchDB password associated with the authenticating user.
JWT Authentication
The following connection properties are required and must always be specified:
- AuthScheme: JWT.
- Url: The Url of your Apache CouchDB instance. For example: http://localhost:5984.
From here you can:
1. Set the following so that the connector automatically generates (and refreshes if applicable) the tokens for you:
Required
- JWTSubject: The name of the user to assign to the JWT token.
- JWTAlgorithm: The algorithm to use for the JWT token signature.
- JWTKeyType: The type of the encryption key.
- JWTKey: The encryption key used to sign the JWT token generated by the connector.
Optional
- JWTIssuer: The issuer of the JWT token.
- JWTExpiration: How long the JWT token should remain valid, in seconds.
- JWTHeaders: A collection of extra headers that should be included in the JWT header.
- JWTClaims: A collection of extra claims that should be included in the JWT payload.
- CredentialsLocation: The location of the settings file where the JWT token is saved.
2. Or you can generate the tokens yourself manually and pass them to the connector by using the JWTToken connection property.
Generating the key pair
When using asymmetric algorithms to sign the tokens, you must generate a private/public key pair. For that, a cryptographic library like OpenSSL can be used. For example:
# generate private key openssl genrsa --out private_rsa256.pem 2048 # extract public key openssl rsa -in private_rsa256.pem -pubout > public_rsa256.pem
JWT Configurations
Refer to CouchDB JWT Authentication Documentation for the following.
The alg and sub are required claims and will always be validated by the Apache CouchDB instance. Other required claims can be configured in the server (see required_claims). In that case, you must use JWTHeaders and JWTClaims so that the connector can include those additional claims when generating the JWT token.
You can use roles_claim_name or the roles_claim_path options to assign roles to the JWT tokens.
Refer to the following example for configuring the server and the connector:
server configuration
[chttpd] ... authentication_handlers = {chttpd_auth, jwt_authentication_handler}, {chttpd_auth, cookie_authentication_handler}, {chttpd_auth, default_authentication_handler} admin_only_all_dbs = false ... [jwt_auth] ... required_claims = exp roles_claim_path = my.nested._couchdb\.roles rsa:rsa_256 = -----BEGIN PUBLIC KEY-----\nYOUR_PUBLIC_KEY\n-----END PUBLIC KEY-----\n ...
connector configuration
Url=http://localhost:5984; JWTSubject=JWT User 1; JWTAlgorithm=RS256; JWTKeyType=PEMKEY_FILE; JWTKey=PATH_TO_FOLDER\private_rsa256.pem; JWTHeaders=kid : rsa_256 | Custom Header 1 : Test 1; JWTClaims= my : eyJuZXN0ZWQiOnsiX2NvdWNoZGIucm9sZXMiOlsidXNlcjIiXX19 | Custom Claim 1 : Test 1;
Anonymous
Set the following to connect to data:
- AuthScheme: None.
- Url: The Url of your Apache CouchDB instance. For example: http://localhost:5984
- PublicDatabases: A comma-separated list of public databases to list as tables.