Table of Contents

Search

  1. Preface
  2. Part 1: Getting Started with Snowflake Data Cloud Connector
  3. Part 2: Data Integration with Snowflake Data Cloud Connector
  4. Part 3: SQL ELT with Snowflake Data Cloud Connector
  5. Appendix A: Data type reference
  6. Appendix B: Additional runtime configurations
  7. Appendix C: Upgrading to Snowflake Data Cloud Connector

Snowflake Data Cloud Connector

Snowflake Data Cloud Connector

Granting access to the storage locations

Granting access to the storage locations

Grant the Snowflake service principal access to the Azure Services storage accounts.
  1. Run the DESCRIBE INTEGRATION command to retrieve the following consent URL:
    desc storage integration <integration_name>;
    where integration_name is the name of the integration you created.
    The URL in the AZURE_CONSENT_URL column has the following format:
    https://login.microsoftonline.com/<tenant_id>/oauth2/authorize?client_id=<snowflake_application_id
    Copy the value in the AZURE_MULTI_TENANT_APP_NAME column. This is the name of the Snowflake client application created for your account. You need this information to grant this application the required permissions to get an access token for the storage locations.
  2. In a web browser, navigate to the URL in the AZURE_CONSENT_URL URL column.
    The page displays a Microsoft permissions request page.
  3. Click
    Accept
    .
    This allows the Azure service principal created for your Snowflake account to obtain an access token on any resource inside your tenant. The access token is generated successfully only if you grant the service principal the appropriate permissions on the container.
  4. Log into the Microsoft Azure portal.
  5. Navigate to
    Azure Services
    Storage Accounts
    , and then click the name of the storage account for which you want to grant the Snowflake service principal access to.
  6. Click
    Access Control (IAM)
    Add Role Assignment
    .
  7. Select the required role to grant to the Snowflake service principal:
    • Storage Blob Data Reader: Grants read access only. You can load data from files staged in the storage account.
    • Storage Blob Data Contributor: Grants read and write access. You can load data from or unload data to files staged in the storage account.
  8. Search for the Snowflake service principal.
    This is the identity in the AZURE_MULTI_TENANT_APP_NAME property in the DESC STORAGE INTEGRATION output in Step 1. It might take an hour or longer for Azure to create the Snowflake service principal requested through the Microsoft request page. If the service principal is not available immediately, it is recommended that you wait for an hour or two and then search again. If you delete the service principal, the storage integration stops working.
  9. Click
    Save
    .
    The role assignments might take up to five minutes to take affect.

0 COMMENTS

We’d like to hear from you!