Configure OAuth for a Denodo connection

ThoughtSpot supports OAuth for a Denodo connection.

To configure OAuth for Denodo, you create an app in the Identity Provider and use the app’s credentials to register it in Denodo as an external token provider. Once these steps are completed, Denodo will allow connections coming in with the JWT issued by the IdP.

Part 1: Configuring the IdP with Okta

The following steps detail the configuration of IdP with Okta as an example. You can set up any other OpenID Connect (OIDC)-based IdP providers following a similar process. For details, refer to the respective documentation for those.

To configure the IdP with Okta, do the following:

  1. Log in to the Okta console with a user having administrator privileges. Navigate to the Applications page in the console and click Create App Integration.

    dremio oauth1
  2. For sign-in method, choose OIDC - OpenID Connect.

  3. For application type, choose Web Application

  4. Click Next.

  5. Under Grant type, make sure Authorization Code and Refresh Token are selected.

    denodo oauth2
  6. For Sign-in redirect URIs, add the ThoughtSpot redirect URI for the application.

    It should follow this format:


    dremio oauth3
  7. Assign the application to everyone in the organization or to specific groups. This step may vary for other IdPs.

    dremio oauth4
  8. Collect the client credentials from the application home page and make a note of them. These will be required later for adding the external token provider in Denodo.

    denodo oauth5
  9. Go to Security  API, and make a note of the value for Audience. This is required in a later step for configuring the OpenID well-known URI for the authorization server.

    dremio oauth6

    For Okta, it should follow this format:


  10. Open the URL in a browser and make a note of the values for the following parameters:

    • Issuer

    • Authorization endpoint

    • JWKS URI

    • Token endpoint

Part 2: Adding external token provider in Denodo

To add an external token provider in Denodo, do the following:

  1. Log in to the Denodo administrator tool and click the Administration tab.

  2. Click Server Authentication from the menu.

  3. Click OAuth and fill in the details from your IdP.

    denodo oauth7

    For User Claim Mapping, use the value of the claim in the JWT issued by the IdP that contains the value of the username in Denodo.

    Example token generated by Okta:

    dremio oauth8

Part 3: JDBC Connection URL

Connection string for JDBC should include the token string for password parameter with username left empty.

Example connection string: