You finish a build, open Looker to check analytics, and realize access tokens expired again. Half your team stalls waiting for approvals. It’s the classic DevOps facepalm, caused by disconnected identity logic between Looker and TeamCity.
Looker is brilliant at surfacing business data but it expects consistent permissions from analytics users. TeamCity runs code and pipelines fast, yet it focuses on build automation, not identity sync. When you put them together, you want dashboards that update from CI results, governed by the same roles that manage deployments. Looker TeamCity integration ties those worlds so your metrics know what your code just did.
Here’s the simple concept. Every build in TeamCity can trigger Looker actions through REST or webhook calls. That’s where identity should flow too. If your company uses Okta, Azure AD, or an OIDC-based identity provider, map those tokens inside TeamCity’s environment variables, not separate API secrets manually. Each execution inherits the right access level for Looker queries or metadata writes. The outcome: zero broken reports, and analysts see verified, recent build data.
You can tighten this workflow further with RBAC mapping. Assign Looker roles that mirror TeamCity project permissions, such as “dev,” “qa,” or “release.” Automate secret rotation with AWS Secrets Manager so tokens never sit unencrypted. When permissions change, rebuild triggers refresh the data source automatically. That stops the eerie lag between a user leaving your organization and still appearing in dashboard filters.
Quick answer: How do I connect Looker TeamCity securely?
Use TeamCity’s build parameters to store a temporary OIDC token that Looker trusts for API authentication. Rotate every few hours or after each pipeline run to keep compliance intact with SOC 2 and ISO standards.