The hardest part of connecting enterprise data science to production isn’t fancy models or dashboards. It’s access. Who can touch what, when, and under which identity. Azure SQL and Domino Data Lab solve different sides of that puzzle, and when they meet, access stops being an argument and starts being a feature.
Azure SQL holds structured data that teams actually need for modeling and analysis. Domino Data Lab orchestrates the workflows, compute, and governance around those models. When they integrate, data scientists get controlled yet frictionless access, while security teams keep sleep schedules intact.
Connecting Azure SQL to Domino Data Lab revolves around three ideas: identity, permissions, and environment repeatability. You map a user or service identity in Domino to Azure SQL using standard OIDC or Azure AD tokens. Those tokens link directly to role-based access controls in SQL, meaning no one needs to embed a password in a notebook again. Every query and commit is associated with a verified user, not a shared credential.
A clean integration workflow starts with identity federation. Domino trusts Azure AD to issue credentials, Azure SQL trusts those identities to execute queries. You can automate this via managed identities or a service principal. The real win shows up when you add notebook reproducibility: the same environment, same authorization, every time. One configuration can serve dev, stage, and prod while policies decide who can reach which database.
If authentication errors appear, check token lifetimes and RBAC mappings first. Azure’s default token lifetime can expire mid-session in long Domino runs, so extend or refresh automatically with the managed identity flow. Logging at both ends helps too, since Azure SQL can report failed logins by principal.