Tableau integration preflight checks

To ensure successful metadata ingestion and lineage generation, complete the following preflight checks.

In your Tableau environment

To ensure Collibra Data Lineage can accurately harvest metadata and perform automatic stitching, verify the following configuration requirements.

Environment Supported versions / details
Tableau Cloud Always supported (latest version).
Tableau Server Versions 2020.2 through 2024.x.
Licensing Tableau Data Management is required to harvest the full metadata stack necessary for detailed technical lineage.
API acess The Tableau Metadata API must be enabled to support automatic stitching.

Roles, permissions, and mandatory settings

Before starting the integration in Data Catalog, ensure you have completed these mandatory external tasks:

Note These tasks are managed within the Tableau environment. Because third-party interfaces may change, we strongly recommend consulting the official Tableau documentation for the most current procedures.

Token and authentication security

Successful metadata harvesting depends on the validity of your Tableau Personal Access Token (PAT).

  • Tokens are valid for a maximum of one year (this can be configured to a shorter duration).
  • Regardless of the total lifespan, a token expires if unused for two weeks. You must run a harvest at least once every 14 days to keep the token active.
  • Lineage results are restricted by the specific site roles and permissions assigned to the user who generated the token.

In your Collibra environment

Lineage enablement

  • Technical lineage via Edge is enabled in your Collibra environment.

Edge

  • You either created and installed an Edge site or were granted a Collibra Cloud site.
    Important If you're using a Collibra Cloud site, go the Collibra Cloud site documentation to check if your data source is supported.
  • The Edge site status must be Healthy.

Network and proxy configuration

  • Edge can connect to all Collibra Data Lineage service instances in your geographic location.
  • Optionally, you've connected to a proxy server.
  • Optionally, use a custom certificate to allow the Edge capability to connect to your data source. In this case, you've saved the certificate as "ca.pem" in the same directory as the Edge site installer. If you've saved the certificate in another directory, use the --ca argument in the Edge site installation command.

Collibra permissions

You can connect to Collibra Data Lineage by using the basic or OAuth authentication method. The following permissions are required only if you use the basic authentication method. 

To create a new target domain for asset ingestion:

To create a Tableau connection:

  • You have a global role with the Product Rights > System administration global permission.
  • You have a global role that has the Manage Edge sites global permission.
  • You have a global role that has the Manage connections and capabilities global permission.
  • A resource role with Configure external systemresource permission, for example Owner.
  • If you connect to Tableau Online, you have a Tableau user with at least Viewer rights.
  • If you connect to Tableau Server, you have a Tableau user with access to at least one site.
  • You have the necessary Tableau permissions, as described in Tableau roles, permissions, and mandatory settings.
  • You have added a vault to your Edge site.
    Note  Vaults are not supported on Collibra Cloud sites.
  • If your data source connection requires a file from your vault, the file must be encoded into Base64 and stored as a regular secret in your vault.

To connect to Collibra Data Lineage service instances via OAuth authentication:

To add an Edge capability:

To synchronize technical lineage: