Copy the value in the AZURE_MULTI_TENANT_APP_NAME column. This is the name of the Snowflake client application created for your account. You need this information to grant this application the required permissions to get an access token for the storage locations.
In a web browser, navigate to the URL in the AZURE_CONSENT_URL URL column.
The page displays a Microsoft permissions request page.
Click
Accept
.
This allows the Azure service principal created for your Snowflake account to obtain an access token on any resource inside your tenant. The access token is generated successfully only if you grant the service principal the appropriate permissions on the container.
Log into the Microsoft Azure portal.
Navigate to
Azure Services
Storage Accounts
, and then click the name of the storage account for which you want to grant the Snowflake service principal access to.
Click
Access Control (IAM)
Add Role Assignment
.
Select the required role to grant to the Snowflake service principal:
Storage Blob Data Reader: Grants read access only. You can load data from files staged in the storage account.
Storage Blob Data Contributor: Grants read and write access. You can load data from or unload data to files staged in the storage account.
Search for the Snowflake service principal.
This is the identity in the AZURE_MULTI_TENANT_APP_NAME property in the DESC STORAGE INTEGRATION output in Step 1. It might take an hour or longer for Azure to create the Snowflake service principal requested through the Microsoft request page. If the service principal is not available immediately, it is recommended that you wait for an hour or two and then search again. If you delete the service principal, the storage integration stops working.
Click
Save
.
The role assignments might take up to five minutes to take affect.