Best Practices

Snowflake Security Changes: New MFA Requirements and Best Practices (Deep Dive)

Snowflake Security Changes: New MFA Requirements and Best Practices (Deep Dive)

PUBLISHED ON

Snowflake has steadily increased its security stance throughout 2024 and into 2025 with new tools like the Trust Center to evaluate and monitor security risks and by taking aggressive action on eliminating single-factor authentication using usernames and passwords alone. This is part of a broader effort to align with best cybersecurity practices and prevent credential theft and phishing attacks that remain among the most common security threats.

By November 2025, no users (either human or service accounts) will be able to log in using just a password. Since October 2024, Snowflake has begun enforcing MFA (multi-factor authentication) by default on newly created accounts, and security will be further tightened by removing password-only authentication entirely by November 2025.

Who Is Affected?

- Human Users (TYPE=PERSON or NULL): Any human user logging into Snowflake with only a password will be subject to mandatory MFA by April 2025. SAML/OAuth-based authentication will not require MFA. After April, if users have not enrolled in MFA, their next login attempt will prompt them to enable it. By August 2025, password-only logins will be impossible regardless of custom authentication policies. Finally, by November 2025, password-only authentication will be fully abolished.

- Service Users (TYPE=SERVICE/LEGACY_SERVICE): Service users created for ETL tasks or system integrations using TYPE=SERVICE already operate without passwords. Until November 2025, LEGACY_SE users can still rely on passwords. After the November 2025 deadline, all LEGACY_ SERVICE users will be forcibly converted to SERVICE users, making password-based logins unavailable.

Key Milestones:

April 2025: All human users on accounts without a customized authentication policy will be required to enroll in MFA the next time they sign in using a password. LEGACY_SERVICE users will be blocked from accessing Snowsight

August 2025: MFA will be required for all password-based sign-ins for human users, regardless of any custom authentication policy.

November 2025: Password-only authentication is fully blocked. LEGACY_SERVICE users are forcibly converted to SERVICE users, making password-based access impossible. If users and systems have not migrated to MFA, SAML/OAuth, or KeyPair authentication, they will lose access to Snowflake.

Action Plan:

1. Setup SSO/SCIM: If you haven't, this is a perfect opportunity to move to single sign-on and SCIM. This will satisfy Snowflake’s MFA requirements, simplify the login flow, reduce your attack surface, and automate the provisioning and de-provisioning of users.

2. Create Authentication Policies: Authentication policies give admins fine-tuned control over how each user authenticates, further securing your Snowflake instance. For most use cases, I recommend three separate authentication policies to handle SSO users, admins, and external users.

3. Apply Authentication Policies: Authentication policies can be applied at the account level (aka default) and user level. When using SSO/SCIM, it's advised to set your SSO authentication policy at the account level so newly provisioned users through your IdP are automatically handled. You may then use the ALTER USER command to apply your other authentication policies respectively. Examples:

ALTER ACCOUNT SET AUTHENTICATION POLICY <policy_name>;
ALTER USER <user> SET AUTHENTICATION POLICY <policy_name>;

4. Set User Types (TYPE): Clearly separate human users (TYPE=PERSON or NULL) from system accounts (TYPE=SERVICE or LEGACY_SERVICE). Any non-human (service or integration) users should be reclassified as SERVICE which will remove and disallow passwords.

ALTER USER <user> SET TYPE = SERVICE;

5. Transition Service Users to KeyPair or OAuth: SERVICE users cannot log in with passwords. They must use KeyPair or OAuth 2.0 tokens. For external API integration and batch processes, KeyPair authentication is typically recommended.

Identify Affected Users

The easiest way to see which users in your Snowflake account will be affected by these changes is with a simple SQL query run asThis query will show all active human users with passwords that are not enrolled in MFA.

SELECT name, type, disabled, has_mfa, has_password
FROM snowflake.account_usage.users
WHERE deleted_on IS NULL
  AND has_mfa = false
  AND has_password
  AND (type IS NULL OR type IN ('PERSON', 'LEGACY_SERVICE'))
  AND disabled = 'false'
ORDER BY NAME ASC;

Recommend Authentication Policies

Authentication policies at creation are stored in a database and schema. Therefore, I recommend creating a SECURITY database and a POLICIES schema at the ACCOUNTADMIN level to both store and reference policies.SSO Auth PolicyThis policy limits SSO users to authenticate through SAML/KeyPair and disallows username/password auth. We have also removed the required MFA_ENROLLMENToption because ideally, you should be handling MFA through your IdP with SSO.

CREATE OR REPLACE AUTHENTICATION POLICY sso_auth_policy
  AUTHENTICATION_METHODS = ('SAML', 'KEYPAIR')
  CLIENT_TYPES = ('SNOWFLAKE_UI', 'SNOWSQL', 'DRIVERS')
  MFA_AUTHENTICATION_METHODS = ('SAML');
  --MFA_ENROLLMENT = REQUIRED; -- Disable if using SSO/SCIM with MFA

Admin Auth Policy

While similar to the SSO auth policy above, it’s imperative to allow select administrators to have username/password access as a backdoor in case the SSO integration breaks. If that integration breaks for any reason and you’ve disallowed all username/password access, you will be locked out and forced to open a ticket with Snowflake to restore your access.

Since password authentication is allowed with this policy, it’s required that its users are enrolled in Snowflake’s MFA.

CREATE OR REPLACE AUTHENTICATION POLICY admin_auth_policy
  AUTHENTICATION_METHODS = ('SAML', 'PASSWORD', 'KEYPAIR')
  CLIENT_TYPES = ('SNOWFLAKE_UI', 'SNOWSQL', 'DRIVERS')
  MFA_AUTHENTICATION_METHODS = ('PASSWORD', 'SAML')
  MFA_ENROLLMENT = REQUIRED;

External Auth Policy

For users outside of your organization that won’t be provisioned through SCIM, this policy will require MFA enrollment.

CREATE OR REPLACE AUTHENTICATION POLICY external_auth_policy
  AUTHENTICATION_METHODS = ('PASSWORD','KEYPAIR')
  CLIENT_TYPES = ('SNOWFLAKE_UI', 'SNOWSQL', 'DRIVERS')
  MFA_AUTHENTICATION_METHODS = ('PASSWORD')
  MFA_ENROLLMENT = REQUIRED;

See Which Policy is Applied to Who
If you are trying to figure out which authentication policy is applied to which users, you can use this handy SQL query to return that list. Replace the <database> and <policy_name> respectively.

SELECT *
FROM TABLE(
    <database>.INFORMATION_SCHEMA.POLICY_REFERENCES(
      POLICY_NAME => '<database>.POLICIES.<policy_name>'
  )
);

Setup KeyPair for Service Users

Refer to Snowflake’s KeyPair documentation for up-to-date information, advanced use cases, and more in-depth explanations.

KeyPair’s can be created with or without a passphrase. Some integrations may not allow or have the ability to enter a passphrase so create yours accordingly.

KeyPairs work by having a private key and a public key that are mathematically linked to ensure secure communication, authentication, or data exchanges. You must store your keys and passphrases safely and securely.

Generate Unencrypted Private Key in Terminal/CMD

openssl genrsa 2048 | openssl pkcs8 -topk8 -inform PEM -out rsa_key.p8 -nocrypt

Generated Encrypted (with Passphrase) Private Key in Terminal/CMD

openssl genrsa 2048 | openssl pkcs8 -topk8 -v2 des3 -inform PEM -out rsa_key.p8

Generate Public Key in Terminal/CMD

openssl rsa -in rsa_key.p8 -pubout -out rsa_key.pub

Assign Public Key to Snowflake User

Only owners of a user, or users with SECURITYADMIN role or higher can altera user's RSA_PUBLIC_ KEY

ALTER USER example_user SET RSA_PUBLIC_KEY='MIIBIjANBgkqh...';

Verify User’s Public Key Fingerprint
Run this code block as one in Snowflake and record the output to compare.

DESC USER example_user;
SELECT SUBSTR((SELECT "value" FROM TABLE(RESULT_SCAN(LAST_QUERY_ID()))
  WHERE "property" = 'RSA_PUBLIC_KEY_FP'), LEN('SHA256:') + 1);

From terminal/CMD, run the following. If the outputs match, you’ve successfully configured your public key.

openssl rsa -pubin -in rsa_key.pub -outform DER | openssl dgst -sha256 -binary | openssl enc -base64

Attach Private Key (and Passphrase)
All there is to do now is take your private key and attach it to your integration(s) with your passphrase if you did an encrypted key and validate that the connection is successful.

Dealing with Issues

Once MFA is enabled, it’s usually only a matter of time before one of your users will lose access to their MFA device and be unable to authenticate. Administrators can use MINS_TO_ BYPASS_ MFA or DISABLE_ MFA options to temporarily restore user access, then re-enable MFA enrollment once that user is back in.

ALTER USER <user> SET MINS_TO_BYPASS_MFA = 5;
ALTER USER <user> SET DISABLE_MFA = TRUE;

Latest

GenAI Adoption for Business: R U AI Ready? (Deep Dive)

Emerging Technologies

GenAI Adoption for Business: R U AI Ready? (Deep Dive)

Ever since December 2022, as Data and AI consultants, we have always been in calls with clients and business dinners, discussing how “Enterprise AI” can help businesses leverage the power of unstructured business data like text files, documents, images, emails, and customer reviews of companies or products. So, what is Gen AI, what does it mean for businesses, and is it all hype? Let’s explore these questions together.

Read
Snowflake Security Changes: New MFA Requirements and Best Practices (Deep Dive)

Best Practices

Snowflake Security Changes: New MFA Requirements and Best Practices (Deep Dive)

2025 is here and with big security changes to Snowflake that WILL break your integrations and affect all users. In this deep dive "everything you need to know" blog our Manager of IT Systems, Trever Ehrfurth, outlines the changes, timeline, and best practices to make sure you remain unaffected and secure.

Read
Harnessing the Power of Mature Data: Navigating CSRD & CSDDD for a Sustainable Future

Best Practices

Harnessing the Power of Mature Data: Navigating CSRD & CSDDD for a Sustainable Future

Sustainability is a key priority for businesses worldwide and with a growing environmental awareness and corporate responsibility, mature data is needed more than ever to drive meaningful change. Learn how organizations harness the power of mature data to navigate the directives stemming from the CSRD Corporate Sustainability Reporting Directive and the new E.U. Corporate Sustainability Due Diligence Directive (CSDDD).

Read
How to Start an Effective Data Governance Program

How to Start an Effective Data Governance Program

Data Governance is about decision-making. Who gets to make the decisions, how they are made, when they are made, etc. There may be several data management tasks or operations that then occur because of the decisions that were made by the data governance program. To have a successful governance program and a data management initiative, these two efforts must be in-sync with each other AND the scope of each should be known and understood. If we understand that data governance is about decision-making, then we can establish that the key to achieving acceptance from the organization for the program is to involve the right people from all parts of the organization in the right places within the program. People want to be heard and involved in decision making. It is also important to note – a data governance program is not a project that ends. It is an ongoing discipline that continues to improve and hopefully thrive over time. The focus of a data governance program could and should change throughout its lifetime as the opportunities around the use of data and information grow within your organization. With the context from above, here are 8 steps to take to implement an effective data governance program within your organization.

Read
Seeing is Believing: Transforming Complex Data into Actionable Insights

Discovery

Seeing is Believing: Transforming Complex Data into Actionable Insights

In today's data-driven world, the ability to extract meaningful insights from vast amounts of information is crucial for making informed decisions and driving business success. However, the sheer volume and complexity of data can often be overwhelming, leaving decision-makers struggling to identify relevant trends and patterns. This is where Pandata Group steps in, offering cutting-edge visualization tools that transform complex data into actionable insights, empowering organizations to navigate their data landscape with confidence.

Read
Simplifying Power BI Data Aggregation: A Comparative Overview

Best Practices

Simplifying Power BI Data Aggregation: A Comparative Overview

In the dynamic world of data science and analytics, professionals must choose the best method for managing and summarizing large datasets. Power BI offers several approaches to tackle this challenge - let's break down some of the techniques to help you understand which might be the best fit for your needs.

Read
Police Data Analysis - Moving from Statistics to Insights

Police Data Analysis - Moving from Statistics to Insights

Read the six-part blog series in one place! Examine how one community dug deeper to analyze policing efforts when the statistics didn't add up. Learn what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned.

Read
A Sustainable Future: Initiating Your ESG Journey with Data-Driven Solutions

Discovery

A Sustainable Future: Initiating Your ESG Journey with Data-Driven Solutions

In this week's Looking Forward highlight Guy Nelson explores the importance of embracing sustainability with data-driven initiatives. Assessing your starting point, building a roadmap, leveraging data, and unlocking new insights are just a few of the steps in a journey to sustainability and ESG excellence.

Read
Police Data Analysis - Moving from Statistics to Insights

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Police Data Analysis - Moving from Statistics to Insights

Data Analytics

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Police Data Analysis - Moving from Statistics to Insights

Data Analytics

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Police Data Analysis - Moving from Statistics to Insights

Data Analytics

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Police Data Analysis - Moving from Statistics to Insights

Data Analytics

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Why Differentiating Between Data Governance and Data Management Matters

Best Practices

Why Differentiating Between Data Governance and Data Management Matters

This week's Looking Forward blog highlights the importance of differentiating between data governance and data management. Jason Fishbain provides a great reminder of the differences between the two strategies and how each one impacts your organization.

Read
Police Data Analysis - Moving from Statistics to Insights

Data Analytics

Police Data Analysis - Moving from Statistics to Insights

This six part blog series examines how one community dug deeper to analyze policing efforts when the statistics didn't add up. We'll showcase what steps needed to be taken to better understand the data that was presented. From understanding the data and building the data set to quality control and presentation of insight, and finally to the lessons learned. Join us each week as we uncover more to the story and move from statistics to insights.

Read
Unlocking New Possibilities for Business Leaders. Getting Started with Gen AI.

Discovery

Unlocking New Possibilities for Business Leaders. Getting Started with Gen AI.

In the second blog of our Looking Forward series, we explore the discovery category. Here Sumanth Donthula touches on what Generative AI is, how its leveraged, and how you can get started with Gen AI in your organization.

Read
Pandata Group Launches Bamboo SDC:  Rewire Your Sustainability Data Management

Annoucements

Pandata Group Launches Bamboo SDC: Rewire Your Sustainability Data Management

Pandata Group is proud to announce the launch of Bamboo Sustainability Data Cloud (SDC). This innovative platform streamlines the collection and management of Sustainability and Environmental, Social, and Governance (ESG) data, helping organizations enhance efficiency and become more data-driven with accurate, well-modeled, and reliable data. Powered by the Snowflake AI Data Cloud, Bamboo SDC collects, structures, and processes data to develop AI-based insights and sustainability strategies.

Read
Snowflake: Evolving into an AI Powerhouse

Emerging Technologies

Snowflake: Evolving into an AI Powerhouse

What better way to kick off our new blog series, Looking Forward, than to dive into the conversation we're all having - AI. In this blog, Jefferson Duggan explores how Snowflake, a known data warehousing and cloud platform powerhouse, is pivoting to something bigger. He also discusses how emerging technologies such as Open AI are paving the way.

Read
Mastering the Data Cloud Summit: What to Pack

Events

Mastering the Data Cloud Summit: What to Pack

It's that time of the year again. Snowflake Data Cloud Summit is right around the corner and we're planning our trip to San Fransisco. Are you? Over the next few weeks, we'll highlight why you should attend, dos and donts of summit, what to pack, and everything in between to ensure you're prepared for the four-day conference. Explore why you should attend in part one here!

Read
Mastering the Data Cloud Summit: Must Do Activities During Your Visit

Events

Mastering the Data Cloud Summit: Must Do Activities During Your Visit

It's that time of the year again. Snowflake Data Cloud Summit is right around the corner and we're planning our trip to San Fransisco. Are you? Over the next few weeks, we'll highlight why you should attend, dos and donts of summit, what to pack, and everything in between to ensure you're prepared for the four-day conference. Explore why you should attend in part three here!

Read
Mastering the Data Cloud Summit 24: Dos and Donts

Events

Mastering the Data Cloud Summit 24: Dos and Donts

It's that time of the year again. Snowflake Data Cloud Summit is right around the corner and we're planning our trip to San Fransisco. Are you? Over the next few weeks, we'll highlight why you should attend, dos and donts of summit, what to pack, and everything in between to ensure you're prepared for the four-day conference. Explore why you should attend in part one here!

Read
Mastering the Data Cloud Summit 24: Why Attend?

Events

Mastering the Data Cloud Summit 24: Why Attend?

It's that time of the year again. Snowflake Data Cloud Summit is right around the corner and we're planning our trip to San Fransisco. Are you? Over the next few weeks, we'll highlight why you should attend, dos and donts of summit, what to pack, and everything in between to ensure you're prepared for the four-day conference. Explore why you should attend in part one here!

Read
The Secrets of AI Value Creation: Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution

Annoucements

The Secrets of AI Value Creation: Practical Guide to Business Value Creation with Artificial Intelligence from Strategy to Execution

This book presents a comprehensive framework that can be applied to your organization, exploring the value drivers and challenges you might face throughout your AI journey. You will uncover effective strategies and tactics utilized by successful artificial intelligence (AI) achievers to propel business growth.

Read
Using Snowflake Git + Kestra to Automate Pipelines

Best Practices

Using Snowflake Git + Kestra to Automate Pipelines

The power of using Kestra, an open-source declarative data orchestration tool.

Read
Transforming Data into Decisions: The Snowflake Revolution in AI/ML

Digital Transformation

Transforming Data into Decisions: The Snowflake Revolution in AI/ML

In the words of a widely acknowledged metaphor, 'Data is the oil of the 21st century, and AI/ML serves as the combustion engine, powering the machinery of tomorrow's innovations.' This analogy succinctly encapsulates the essence of our digital era, underscoring the indispensable roles that data and artificial intelligence/machine learning technologies play in powering the innovations that shape our future.

Read
Tis the Season of Gratitude: Simple Ways to Show Employees You Care Pt 2

Culture

Tis the Season of Gratitude: Simple Ways to Show Employees You Care Pt 2

Show your team how much you value them and there’s nothing they won’t strive to accomplish. We’ve got 4 great ways to show your employees your appreciation.

Read
Tis the season of gratitude: Simple Ways to Show Employees You Care Pt 1

Culture

Tis the season of gratitude: Simple Ways to Show Employees You Care Pt 1

Employees who feel valued and appreciated by their leaders are far more likely to go above and beyond in their work. Here are 5 simple ways to show gratitude to your team.

Read
Hey, you! Get on to my Cloud!

Industry Clouds

Hey, you! Get on to my Cloud!

The emergence of industry data clouds is to help accelerate the development and adoption of digital solutions such as data, apps, and AI. So, what is a data cloud and how do respective industry’s adopt it? In this series we’ll highlight how a data cloud works, the core benefits, industry use case examples, and potential obstacles to consider when implementing it.

Read
4 Reasons to Work with a Snowflake partner for Data, Analytics, and Machine Learning

Digital Transformation

4 Reasons to Work with a Snowflake partner for Data, Analytics, and Machine Learning

It requires the right technical skillset to realize your data’s full potential and see the benefits of a modern data stack built in the Snowflake Data Cloud.

Read
Why Manufacturing Leaders Should Embrace the Cloud in 2023

Digital Transformation

Why Manufacturing Leaders Should Embrace the Cloud in 2023

Now more than ever, CIOs and Leadership need to collaborate and look to the unique advantages of cloud, data, and analytics

Read
The Whats, Whys, and Hows of an Analytical Community of Excellence

Data Analytics

The Whats, Whys, and Hows of an Analytical Community of Excellence

Communities of Excellence can create operational efficiencies, drive higher ROIs on data related projects, and create trust in the organization’s information.

Read
Snowflake Summit 2023: Three Days In The Desert With Plenty Of Snow

Snowflake Summit 2023: Three Days In The Desert With Plenty Of Snow

From inspiring keynote speeches to hands-on workshops, the Snowflake Summit 2023 provided attendees with invaluable insights and practical knowledge.

Read
Data Modeling In The Cloud Era

Data Modeling In The Cloud Era

Here is why data modeling is a vital part of enterprise data management.

Read
The Time is Now for Manufacturing to Adopt Cloud Analytics

Data Analytics

The Time is Now for Manufacturing to Adopt Cloud Analytics

The manufacturing industry is undergoing a digital transformation, and one of the key technologies driving this transformation is cloud analytics.

Read