Creating the Data Source Name
This section describes how to edit the DSN configuration and then authenticate and connect to SAP HANA APIs.
DSN Configuration
You can use the Microsoft ODBC Data Source Administrator to edit the DSN configuration. Note that the installation process creates a both a user DSN and a system DSN, as described in Installing the Connector.
Note: The connector stores connection information in the Windows registry. To ensure that the connector can write to the registry, either run Power BI as an administrator or use a User DSN for your connection instead of a System DSN.
User DSN
Complete the following steps to edit the DSN configuration:
- Select Start > Search, and enter ODBC Data Sources in the Search box.
- Choose the version of the ODBC Administrator that corresponds to the bitness of your Power BI Desktop installation (32-bit or 64-bit).
- Select the system data source and click Configure.
- Edit the information on the Connection tab and click OK.
System DSN
Configure the system DSN the same way as the user DSN, except you will need to switch to the System DSN tab before performing Step 3.
Connecting to SAP HANA Cloud
Set the following to connect to data:- Server: Set this property to the name or network address of the SAP HANA database instance.
- Port: Set this to 443.
- UseSSL: Set this to True.
Connecting to SAP HANA On-Prem
Set the following to connect to data:
- Server: Set this property to the name or network address of the SAP HANA database instance.
- Port: The port of the server hosting the SAP HANA database.
Authenticating to SAP HANA
Once you have provided the connection details, set the following database credentials to authenticate to SAP HANA:
- User: The username provided for authentication with the SAP HANA database.
- Password: The password provided for authentication with the SAP HANA database.
Okta
Set the AuthScheme to Okta. The following connection properties are used to connect to Okta:
- User: Set this to the Okta user.
- Password: Set this to Okta password for the user.
- SSOProperties (optional): Set this to the OTP code that was sent to your device. This property should be used only when MFA is required for OKTA sign on.
The following SSOProperties are needed to authenticate to Okta:
- SSOLoginUrl: Set this to the OKTA's login URL.
- MFAType (optional): Set this to the multi-factor type. This property should be used only when MFA is required for OKTA sign on. This property accepts one of the following values:
- OKTAVerify
- SMS
- APIToken (optional): Set this to the API Token that the customer created from the Okta org. It should be used when authenticating a user via a trusted application or proxy that overrides OKTA client request context.
The following is an example connection string:
AuthScheme=OKTA;User=username;Password=password;Server=myserver;SSO Properties='SSOLoginUrl=https://cdata-okta.okta.com';