Freigeben über


Error while impersonating an user in SQL Server Analysis Services

 

Hi folks, recently I came across an interesting issue related to impersonation in SSAS and I thought of sharing with you.

Scenario and Issue:

Let’s say we are trying to impersonate a user while browsing a cube in SSAS (Fig2). You might encounter with below error(Fig1). In first occurrence, it might feel like this is a login failure issue since error says as below but it’s not.

Error:  The following system error occurred: The user name or password is incorrect.

You might see below error in the event Viewer log as well

 

An account failed to log on.

Subject:

Security ID:

Domain\UserName

Account Name:

[SA account]

Account Domain:

[DOMAIN]

Logon ID:

0x192D1

 

Logon Type: 3

 

Account For Which Logon Failed:

Security ID:

NULL SID

Account Name:

Account Domain:

 

Failure Information:

Failure Reason:

Unknown user name or bad password.

Status:

0xC000006D

Sub Status:

0xC0000064

 

Process Information:

Caller Process ID:

0x7dc

Caller Process Name:

C:\Program Files\Microsoft SQL Server\MSAS13.MSSQLSERVER\OLAP\bin\msmdsrv.exe

 

Network Information:

Workstation Name:

[Server]

Source Network Address:

-

Source Port:

-

 

Detailed Authentication Information:

Logon Process:

OLAPSvc

Authentication Package:

Kerberos

Transited Services:

-

Package Name (NTLM only):

-

Key Length:

0

Initially I thought it might be related to Kerberos authentication, but we could reproduce the issue local to SSAS server. Hence it is not related to Kerberos.

We have tried EffectiveUserName Property in the connection string, but even there we are seeing the same error. For more info about EffectiveUserName, refer to /en-us/sql/analysis-services/instances/connection-string-properties-analysis-services.

Note: EffectiveUserName is not case sensitive

While doing further research we found that Issue was with SSAS service account. In our case, we were using domain account as the SSAS service account and it looked like few permissions are missing.

We came to know that the SSAS service account is not part of the “Windows Authorization Access Group” active directory group. For more info about this AD group, refer to https://technet.microsoft.com/en-us/library/dn579255(v=ws.11).aspx#BKMK_WinAuthAccess.

We have followed the below steps to Grant the SSAS service domain account in this AD group: Windows Authorization Access Group.

Step 1:

Went to Active Directory Users and Computers

 

Step 2:

Double clicked on Windows Authorization Access Group =>Members

Step 3:

Added the required SSAS Domain service account and Apply

Step 4:

We restarted the SSAS service and issue has been fixed.Now we can able to impersonate the other user using different account while browsing the cube

 

Note: The problem does not exist when the SSAS service account is the local system account, but only happens when using a domain user account.

Hope this helps you as well.

 

Author:      Vikas Kumar – Support Engineer, SQL Server BI Developer team, Microsoft

Reviewer:   Sarath Babu Chidipothu  – Support Escalation Engineer, SQL Server BI Developer team, Microsoft