All posts

How to Configure Azure SQL Domino Data Lab for Secure, Repeatable Access

The hardest part of connecting enterprise data science to production isn’t fancy models or dashboards. It’s access. Who can touch what, when, and under which identity. Azure SQL and Domino Data Lab solve different sides of that puzzle, and when they meet, access stops being an argument and starts being a feature. Azure SQL holds structured data that teams actually need for modeling and analysis. Domino Data Lab orchestrates the workflows, compute, and governance around those models. When they i

Free White Paper

VNC Secure Access + Customer Support Access to Production: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

The hardest part of connecting enterprise data science to production isn’t fancy models or dashboards. It’s access. Who can touch what, when, and under which identity. Azure SQL and Domino Data Lab solve different sides of that puzzle, and when they meet, access stops being an argument and starts being a feature.

Azure SQL holds structured data that teams actually need for modeling and analysis. Domino Data Lab orchestrates the workflows, compute, and governance around those models. When they integrate, data scientists get controlled yet frictionless access, while security teams keep sleep schedules intact.

Connecting Azure SQL to Domino Data Lab revolves around three ideas: identity, permissions, and environment repeatability. You map a user or service identity in Domino to Azure SQL using standard OIDC or Azure AD tokens. Those tokens link directly to role-based access controls in SQL, meaning no one needs to embed a password in a notebook again. Every query and commit is associated with a verified user, not a shared credential.

A clean integration workflow starts with identity federation. Domino trusts Azure AD to issue credentials, Azure SQL trusts those identities to execute queries. You can automate this via managed identities or a service principal. The real win shows up when you add notebook reproducibility: the same environment, same authorization, every time. One configuration can serve dev, stage, and prod while policies decide who can reach which database.

If authentication errors appear, check token lifetimes and RBAC mappings first. Azure’s default token lifetime can expire mid-session in long Domino runs, so extend or refresh automatically with the managed identity flow. Logging at both ends helps too, since Azure SQL can report failed logins by principal.

Continue reading? Get the full guide.

VNC Secure Access + Customer Support Access to Production: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.

Benefits that quickly compound:

  • End-to-end identity consistency across modeling and data layers
  • Faster onboarding since scientists use corporate SSO instead of local creds
  • Auditable access paths that align with SOC 2 and GDPR expectations
  • No password sprawl or hidden connection strings in notebooks
  • Cleaner environment replication for reproducible results

On a day-to-day basis, this link means fewer Slack messages like “Who made this connection?” or “Why won’t my token work?” Developer velocity improves because access is implicit in identity. Less waiting, more iterating.

Platforms like hoop.dev turn those access rules into guardrails that enforce policy automatically. Rather than relying on manual configuration, you define who can reach Azure SQL from Domino once, and hoop.dev enforces it everywhere. The setup becomes both simpler and harder to break.

How do I connect Azure SQL and Domino Data Lab securely?
Use Azure AD for authentication and assign least-privilege roles in SQL. Connect Domino’s workspace to those identities with managed credentials, not static keys. This keeps compliance intact while enabling programmatic access.

As AI copilots grow inside Domino, identity-linked data access gets even more important. Models can request queries autonomously, and you need the same guardrails for them as for humans. The same Azure AD tokens and RBAC logic handle both.

Azure SQL and Domino Data Lab together deliver secure, reproducible data science pipelines with the governance enterprises expect and the freedom engineers need. That balance is what makes them worth integrating well.

See an Environment Agnostic Identity-Aware Proxy in action with hoop.dev. Deploy it, connect your identity provider, and watch it protect your endpoints everywhere—live in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts