Snowflake Setup

Prev Next

Following is a set of prerequisites and instructions to support SaaS Authorization Management for Snowflake:

Prerequisites

Default PlainID User Role

The user assigned to PlainID for connecting to Snowflake (referred to as the POP user) must have sufficient privileges to manage all Orchestration-related operations. We recommend creating a dedicated PLAINID role and assigning it as the default role for the POP user. This role will also act as the owner of all Snowflake policies created from PlainID when operating in Manage Mode.

PlainID Role

Ensure that the PLAINID role is the default role for the User.

Required Privileges for LEARN Mode

To use LEARN mode, users must be granted the following privileges in Snowflake:

Privilege Purpose
APPLY MASKING POLICY Grants the ability to view Masking Policies
APPLY ROW ACCESS POLICY Grants the ability to view Row Access Policies
Integration Grants visibility of the current IDP
USAGE: When IDP is using SCIM
OWNERSHIP: When IDP is using SAML2 or Oauth
Database: USAGE Grants visibility of database objects like schemas or tags.
* Required if granting the Schema: USAGE privilege
Schema: USAGE Grants visibility of schema objects like tables or tags.
* Required if granting the Table: SELECT privilege

Privilege Options:
- Option 1: Grant a privilege on individual schemas
- Option 2: Grant privileges on all existing schemas in the database (recommended)
Note: Usage can also be automated to grant privileges on every future schema created in the database.
Function: USAGE Optional
If you want to manage a Policy using UDF, the USAGE privileges must be granted for that specific function.
EVOLVE SCHEMA Grants visibility for tables and columns within the schema, including future tables. The schema must contain at least one table or View.

Note: In cases when a table or View is used with a select expression in the Policy, the SELECT table/View privilege must be granted for that specific table/View.
Example: Table/View contains additional identity information.
Warehouse: USAGE Grants access to a warehouse to run queries.

Additional Required Privileges for MANAGE Mode

To use MANAGE mode, users must also be granted the following privileges in addition to LEARN mode privileges in Snowflake:

Privilege Purpose
CREATE MASKING POLICY Grants the ability to create Masking Policies.

Privilege Options:
- Option 1: Grant privileges to create Masking Policies on individual schemas.
- Option 2: Grant privileges to create Masking Policies on all existing schemas in the database (recommended).
CREATE ROW ACCESS POLICY Grants the ability to create Row Access Policies.

Privilege Options:
- Option 1: Grant privileges to create Row Access Policies on individual schemas.
- Option 2: Grant privileges to create Row Access Policies on all existing schemas in the database (recommended).

Note: Ensure that you create a new Masking or Row Access Policy for at least one schema.

Policy Ownership

To manage Policies in Snowflake, a user must have the Policy ownership role.
To enable PlainID to manage existing, discovered policies, we recommend that existing Policy ownership roles are connected to the PlainID default Role, so that it inherits ownership. You also have the option to change the ownership of existing policies to the PlainID default role.

Creating a Snowflake Policy Orchestration Point

After setting up a user with all the required privileges for Snowflake, you can now create a Snowflake Policy Orchestration Point (POP).

Ensure that you have an Orchestration Workspace before continuing. You can learn how to create a Snowflake POP in Managing POPs and how to switch between modes in Orchestration Workspace.

Snowflake Connection Settings

Snowflake credentials are used to connect to Snowflake resources through a Policy Orchestration Point (POP).
To connect Snowflake with PlainID, enter the following Connection Fields:

Connection Field Description
Discover Views If you wish to Discover Views, enable Discover Views to include Views along with Tables in the discovery process. (Default is false)
Authentication Method Use Basic Authentication or Key Pair (recommended) for Snowflake integration.
See Authentication Methods section for information on how to authenticate through either option.
Secret Store Choose a Secret Store where your credentials are stored. The default is PlainID Internal Vault.
Fields below are modified based on the chosen Store.
For more information about External Secret Stores like HashiCorp, Azure KeyVault, or AWS IAM for RDS or SM, refer to About Secret Stores.
Compute Warehouse The name of the Snowflake warehouse used for policy evaluation.
Username The Snowflake account username with access to the warehouse and associated objects.
Password If using Basic Authentication and an internal store: The password for the above Snowflake user.
Secret Key The Secret Key of the External Secret Store.
Only for use with External Secret Stores.
Port The port used to connect to Snowflake (typically 443).
Server The full Snowflake server address (e.g., xy12345.us-central-1.snowflakecomputing.com).
Connection Testing

You can test the connection to Snowflake directly from the PlainID Platform to ensure that the user has all the required privileges.

Authentication Methods

Using Basic Authentication
If using Basic Authentication, the configuration includes a Password field where credentials are stored securely. Ensure the password is entered before testing the connection. Only for use with the PlainID Internal Store.

Using Key Pair Authentication
Key pair authentication is a method used to verify identity in a secure manner by using public-key cryptography. Refer to the Snowflake documentation on Using key-pair authentication for information.

If using key-pair authentication, the password field is swapped for a Private Key section with a button to Import Secret Key. Ensure that the key is uploaded before testing the connection.
Only for use with the PlainID Internal Store.
Note: Passphrase is not supported.

For either authentication method, a Secret Key field appears if using External Secret Stores.

PlainID currently supports Private Keys with the extensions .key, .pem, .txt, and .p8. Reach out to PlainID support if you require additional extensions.