Design Studio Preferences

The Design Studio has a local configuration page where you can configure several settings like connection settings between this Design Studio and Virtual DataPort, Kerberos authentication, etc.

This configuration is located in the endpoint denodo-design-studio/#/web-local-login. To access this page, go to one of these URLs:

  • Design Studio of the Solution Manager:
  • Design Studio of a Denodo Platform installation:
Web local login

Web local login

These settings affect all the users of this Design Studio.

The password to log in is local to this application (by default “admin”). This gives you access to this configuration page. Note that this local account does not give actual access to the main functionalities of the Design Studio, only to its local configuration.

In the menu Configuration, you will find these submenus:

Connection Options

In this dialog, you can configure the following parameters of the connection between the Design Studio and Virtual DataPort.

Connection options

Connection options

  • Query timeout (milliseconds): Maximum time the Design Studio will wait for a query to finish. If zero, it will wait indefinitely until the sentence ends.

  • Chunk Timeout (milliseconds): It establishes the maximum time that the Server waits before returning a new block to the Design Studio. When this time is surpassed, the Server sends the current block even if it does not contain the number of results specified in the Chunk Size parameter.


    If Chunk size and Chunk timeout are zero, the Server returns all the results in a single block. If both values are different from 0, the Server returns a chunk whenever one of these conditions happen:

    • The chunk is filled (Chunk size)

    • Or, after a certain time of not sending any chunk to the client (Chunk timeout).

  • Chunk size (rows): The results obtained by executing a sentence can be divided into blocks (chunks), so the Virtual DataPort Server does not have to wait until a sentence ends, to send the processed tuples to the Design Studio.

    This parameter establishes the maximum number of results that a block can contain.

    When the Server obtains enough results to complete a block, it sends this block to the client and continues processing the next results.

  • Maximum number of active connections: maximum number of active connections opened by the Design Studio.

  • Maximum waiting time to obtain a connection: maximum time in milliseconds the Design Studio will wait for a connection before showing an error. If -1, the Design Studio will wait indefinitely.

  • Use WAN optimized communications: If selected, the communications with the server will be optimized for high latency networks. May reduce performance if used in LAN environments.

  • Use only SSL communications: If selected, the communication with the server will be forced to be secured. If SSL is disabled on the Virtual DataPort server, the communication will fail.

Kerberos Settings


This section only applies if you connect directly to the Design Studio of the Denodo Platform installation (e.g. and you want to use Kerberos authentication.

We recommend using the Design Studio of the Solution Manager ( because the Solution Manager provides a single point of access to all the Denodo components, not just the Design Studio. In addition, users will be able to use more Single Sign On protocols like OAuth or SAML, not just Kerberos, to log in to Design Studio. In this case and if you enabled Single Sign On (SSO) on the Solution Manager, these steps are unnecessary. The Solution Manager provides a menu to configure Kerberos for all components included with the Solution Manager Installation, including the Design Studio. The Kerberos Configuration describes how to configure the Kerberos authentication using the Solution Manager.

In this wizard you will be able configure Single Sign On (SSO) on the Design Studio using Kerberos authentication when you access the Design Studio of a Denodo Platform installation.


To enable single sign-on (SSO), you have to enable Kerberos in both Design Studio and the Virtual DataPort server. This section describes de configuration options for the Design Studio. To enable Kerberos authentication in the Virtual DataPort server follow the instructions of the section Kerberos Authentication of the Virtual DataPort Administration Guide.

Kerberos settings

Kerberos settings

  1. Select Use Kerberos to enable Kerberos.

  2. In the box Server Principal, enter the “Service Principal Name” (SPN) used to create the keytab file. That is, the SPN with the Fully Qualified Domain Name (FQDN) of the server where the Web Administration Tool is running. For example, “HTTP/”.

  3. In the field Keytab file, drag and drop the keytab file over the specified area or click it to open a file explorer to select the file. If a key tab file was previously uploaded, it will be shown and you could use the trash icon to delete it.

  4. Leave the Kerberos configuration file box empty unless the host where this Design Studio runs does not belong to a Kerberos realm (e.g., a Windows Active Directory domain). If this host does not belong to a Kerberos realm, do one of the following:

    a. Drag and drop the krb5.conf or krb5.ini file with the Kerberos settings over the specified area or click it to open a file explorer to select the file. If a configuration file was previously uploaded, it will be shown and you could use the trash icon to delete it. b. Or follow the steps described in the appendix Enabling Kerberos Authentication Without Joining a Kerberos Realm.

  5. We recommend selecting the check box Activate Kerberos debug mode the first time you set up Kerberos in case you run into any issues. Once Kerberos is working, disable this.

    When this option is enabled, check the appendix How to Debug Kerberos in Web Applications of the Installation Guide to learn how to see the debug information.

After saving the Kerberos configuration, restart the Design Studio to have these changes take effect. The next time the users access the Design Studio, they will not need to provide their user name and password, because the browser will send the Kerberos credentials of their system. In order for this to work, they need to access using the full qualified URL (FQDN) configured in step 2. For example,

Authentication dialog with Single Sign-On

Authentication dialog with Single Sign-On

The users can provide the URI of the Virtual DataPort server adding the uri parameter to the URL. If they do it, the Design Studio will try to authenticate them against that server without showing authentication page. For example:

Informative Message

You can add an informative message that will be displayed to all users when they log in to the Design Studio. The message can be used to display a welcome message, inform users when the service is expected to be down for maintenance, legal disclaimers, etc.

Informative Message Set-Up

Informative Message Set-Up

To customize the message you can use the editor with the tools available. If you feel more comfortable working with HTML, you can click on the source code icon image0 to see and edit the HTML. After editing, click Ok to save the modifications.

The configured message will show up at the top of the page.

Informative Messaged

Informative Message