App connections overview
App Connections are 5X’s integrated approach to data source management. Unlike traditional BI tools where database connections are managed within the BI interface, 5X Business Intelligence uses App Connections for centralized, secure data access.Why App Connections matter
Centralized management
Unified controlManage all data connections from one place across your entire 5X platform.
Enhanced security
Consistent securityApply consistent security policies and access controls across all platform capabilities.
Simplified setup
Easy configurationPre-configured connection templates make setup faster and more reliable.
Platform integration
Seamless integrationApp Connections work seamlessly with ingestion, IDE, orchestration, and other 5X capabilities.
Understanding BI app connections
What are Business Intelligence app connections?
Business Intelligence app connections define how 5X BI accesses your data warehouse. They contain all the technical details needed for BI to query your data, including:- Authentication credentials - Username, password, or key pair authentication
- Connection parameters - Database, schema, warehouse, and role settings
- Security settings - Access permissions and row-level security policies
- Performance configuration - Timeout settings, connection pooling, and optimization
Two connection options
5X Business Intelligence supports two types of data connections:- Warehouse connections
- Semantic Layer connections
Direct warehouse access:
- Connect directly to your Snowflake, BigQuery, or other warehouse
- Full SQL capabilities with complete access to all data and SQL functions
- Real-time queries that access data as it exists in your warehouse
- Custom transformations using custom SQL for complex analysis
Creating BI app connections
Step 1: Access app connections
-
Navigate to Settings
- From your workspace, click “Settings” in the left sidebar
- Select “App connections” from the settings menu
-
Create new connection
- Click ”+ New app connection”
- Select “Business Intelligence” as the connection type
Step 2: Configure connection details
1
Basic information
Set connection name, description, and tags for easy identification and management.
2
Data source selection
Choose between “Warehouse” for direct access or “Semantic Layer” for unified metrics.
3
Authentication setup
Configure authentication method (username/password or key pair) with appropriate credentials.
4
Connection parameters
Set database, schema, warehouse, and role settings based on your data architecture.
Step 3: Test and save connection
- Test connection - Verify credentials and access permissions
- Review settings - Confirm all configuration details are correct
- Save connection - Create the app connection for use in BI
Connection management
Troubleshooting common issues
Authentication failures
Authentication failures
Possible causes:
- Incorrect username or password
- Expired or invalid credentials
- Wrong authentication method
- Account locked or disabled
- Verify credentials with database administrator
- Check account status and permissions
- Confirm authentication method configuration
- Reset credentials if necessary
Permission errors
Permission errors
Possible causes:
- Insufficient database permissions
- Missing role assignments
- Schema or table access restrictions
- Row-level security policies
- Review role permissions and assignments
- Check schema and table access rights
- Verify row-level security configuration
- Contact database administrator for access
Connection timeouts
Connection timeouts
Possible causes:
- Network connectivity issues
- Database server overload
- Firewall or proxy restrictions
- Incorrect connection parameters
- Test network connectivity
- Check database server status
- Verify firewall and proxy settings
- Review connection timeout configurations
Updating connections
When to update:- Credential rotation - Regular security credential updates
- Permission changes - Modified access requirements
- Infrastructure changes - Database or network modifications
- Performance optimization - Improved connection settings
- Access connection settings - Navigate to app connections
- Edit connection - Modify necessary settings
- Test changes - Verify updated configuration
- Save updates - Apply changes to the connection
Security best practices
Access control
Least privilege
Minimal permissionsGrant only the minimum permissions necessary for BI functionality.
Role separation
Dedicated rolesUse dedicated database roles specifically for BI access.
Regular audits
Access reviewsRegularly review and audit access permissions and usage patterns.
Secure credentials
Credential managementUse secure credential storage and rotation practices.