Published inSnowflake Builders Blog: Data Engineers, App Developers, AI/ML, & Data ScienceSnowflake Perimeter Security GuidanceThe scope of this blog is to enable customers with a short path to value in leveraging Snowflake’s product features to secure your…Feb 1Feb 1
Published inSnowflake Builders Blog: Data Engineers, App Developers, AI/ML, & Data ScienceSnowflake OAuth (managed authorization server) for custom clients (authorization code flow)IntroductionFeb 1Feb 1
Published inSnowflake Builders Blog: Data Engineers, App Developers, AI/ML, & Data ScienceSnowflake | Okta SCIM Deep Dive & Deployment ConsiderationsSystem for cross-domain Identity Management (SCIM) is an often misunderstood protocol with the defined intent of: managing identities in…Feb 1Feb 1
Azure Tri-Secret Secure (BYOK) & External Stage (Service Endpoints) Security ModelWhen customers onboard a Snowflake account, outside of the core perimeter security guidance applied; one of the first tasks is integrating…Jan 25Jan 25
Practical Security Checklist for the WFH Network(Originally Published March 2020)Dec 27, 2023Dec 27, 2023
Quick, Easy, & Free* Tools to up your Security GameMinimal effort security enhancements to Prevent-Detect-Respond to the wide range of cyber threats posing a risk to your business and…Dec 27, 2023Dec 27, 2023
Squid Proxy Reference Architecture (Transparent Proxy) to Snowflake Enterprise Edition use caseCustomers often request to integrate with a web proxy solution; to allow access to certain well-known domains (for example, Snowflake…Dec 26, 2023Dec 26, 2023
OAuth 2.0 Client Credentials Flow to Snowflake (External OAuth)With machine-to-machine (M2M) applications; such as CLIs, daemons, or services running on your back-end, the system authenticates and…Nov 26, 2023Nov 26, 2023