The following is required before connecting to Snowflake in DataRobot:
A Snowflake account
OAuth with security integrations
If you create a security integration when configuring OAuth, you must specify the OAUTH_REDIRECT_URI as https://<datarobot_app_server>/account/snowflake/snowflake_authz_return
In addition to the required fields listed below, you can learn about other available configuration options in the Snowflake documentation.
Required field
Description
Username
A unique identifier of a user inside a Snowflake account (i.e., the name you use to log into Snowflake).
Private key
The string copied from your private key file.
Display name
A unique identifier for your Snowflake credentials within DataRobot.
For more information on Snowflake key pair authentication, including generating private keys and configuring key pair authentication in Snowflake, see the Snowflake documentation.
After clicking Test Connection, a Credentials window appears. Enter your Snowflake client ID, client secret, and account name. Select Snowflake as the OAuth provider.
Click Save and sign in.
Enter your Snowflake username and password. Click Sign in.
To provide consent to the database client, click Allow.
If the connection is successful, the following message appears in DataRobot:
If using Okta as the external identity provider (IdP), you must specify https://<datarobot_app_server>/account/snowflake/snowflake_authz_return as a Sign-in redirect URI when creating a new App integration in Okta.
Microsoft Entra ID is the new name for Azure Active Directory.
A Snowflake account.
External OAuth configured in Snowflake for Microsoft Entra ID.
External OAuth with security integrations
If using Entra ID as the external identity provider (IdP), you must specify https://<datarobot_app_server>/account/snowflake/snowflake_authz_return as a Redirect URI when registering both applications in Entra ID.
This section uses example configurations for setting up an external IdP. For information on setting up an external IdP based on your specific environment and requirements, see the documentation for Okta or Entra ID.
In the appropriate external IdP, create the Snowflake application(s):
Create a new App Integration in Okta:
Go to Applications > Applications.
Click Create App Integration.
For the Sign-in method, select OIDC - OpenID Connect.
For the Application type, select Web Application.
Click Next.
Enter a name for the new application.
Under Grant type, make sure the following options are selected:
Client Credentials
Authorization Code
Refresh Token
Under LOGIN, add http://<datarobot_app_server>/account/snowflake/snowflake_authz_return to the Sign-in redirect URIs.
Click Save—this generates your Client ID and Client secret.
Create a new Authorization Server:
Go to Security > API > Authorization Server. Click Add Authorization Server.
Enter a name.
Set Audience to https://<account_identifier>.snowflakecomputing.com/.
Click Save.
Go to Scopes > Add Scope.
Set Name to session:role:public. public refers to the Snowflake role called Public. This can be a different role name, but it must also exist within Snowflake.
For User Consent, set Required.
Add Require user consent for this scope and Block services from requesting this scope.
(Optional) Set the offline_access scope to require consent.
Go to Access Policies and click Add Policy.
For Assign to, select The following clients and select the application you just created.
Click Create Policy.
Click Add Rules.
Enter a name and make sure the following options are selected:
Add Check-in Client Credentials.
Add Check-in Authorization Code.
Click Create Rule.
Required information
Before proceeding with Snowflake and DataRobot setup, make sure you've copied the following information in Okta:
Client ID
Client secret
Okta Issuer URL
JWKS URI
Audience
Audience is listed under the Settings tab, and to find the issuer URL and JWKS URI, click on the Metadata URI link. This loads the JSON items that includes the required information.
(Optional) Test the application
To test the application you just created in Okta:
Go to Token Preview and fill in the Request Properties with the grant type, a user assigned to the application, and the specified scope. Click Preview Token.
This results in the following:
Issuer, for example, https://dev-11863425.okta.com/oauth2/aus15ca55wkdOxplJ5d7.
Auth Token for programmatic access to the Okta API.
Auth server metadata JSON (found in Settings > Metadata URI).
Register an application for Snowflake Resource in Microsoft Entra ID:
Go to MS Azure > Microsoft Entra ID > App registrations.
Click New registration.
Under Name, enter Snowflake OAuth Resource.
Under Supported account types, select Accounts in this organizational directory only.
Under Redirect URI, select Web and enter https://<datarobot_app_server>/account/snowflake/snowflake_authz_return.
Click Register.
Expose the API.
Click the set link next to Application ID URI make sure it is a unique ID (this does not need any change ). This will be the <SNOWFLAKE_APPLICATION_ID_URI> value.
Click Add a scope to add a scope representing the Snowflake role.
Using the name of the role in Snowflake, enter the scope as follows: session:scope:<snowflake_role_name>. If it's a custom role, set the role name in Snowflake, and enter the scope as follows: session:scope:<custom_role_name>.
Add another scope name as session:role-any.
Copy the value of the newly created scope. This will be <OAUTH_SCOPES> value.
Register an application for Snowflake Client App in Microsoft Entra ID:
Go to MS Azure > Microsoft Entra ID > App registrations.
Click New registration.
Under Name, enter Snowflake OAuth Client.
Under Supported account types, select Accounts in this organizational directory only.
Under Redirect URI, select Web and enter https://<datarobot_app_server>/account/snowflake/snowflake_authz_return.
Click Register.
In the Overview section, copy the client ID from the Application (client) ID field. This will be known as the <OAUTH_CLIENT_ID>.
Open Certificates & secrets and select New client secret.
Click Add. Copy the secret. This will be known as the <OAUTH_CLIENT_SECRET>.
Optional For programmatic clients that need to request an access token on behalf of a user, configure delegated permissions for applications as follows:
Click API Permissions.
Click Add Permission.
Click on My APIs.
Click on the Snowflake OAuth Resource that you created in Step 1: Configure the OAuth Resource in Entra ID.
Click on the Delegated Permissions box.
Check on the Permission related to the Scopes created in step 3 session:role-any
Click Add Permissions.
Collect the following information for the Snowflake integration:
Click App Registrations.
Click the Snowflake OAuth Resource.
On the Overview page, click Endpoints.
Copy the first part of the OAuth 2.0 token endpoint (v2) URL, e.g. https://login.microsoftonline.com/6064c47c-80e4-4a555b-82ee-1fc5643b37a2. This will be <ISSUER_URL> value
Copy the value of OpenID Connect metadata document and paste it on a new window. Locate the "jwks_uri" parameter, which will be the <JWS_KEY_ENDPOINT> value (e.g., https://login.microsoftonline.com/6064c47c-80e4555b-82ee-1fc5643b37a2/discovery/v2.0/keys).
Copy the value of Federation metadata document and open the URL in a new window. Locate the "entityID" parameter, which will be the <ENTITY_ID> value, also known as <AZURE_AD_ISSUER> (e.g., https://sts.windows.net/6064c47c-80e4-555582ee-1fc5643b37a2/).
Make sure you've copied the following values:
<OAUTH_SCOPES> copied from Snowflake OAuth Resource.
<APP_ID_URI>, <ISSUER_URL>, <JWS_KEY_ENDPOINT> and <ENTITY_ID> values from the Overview and Endpoints view of Snowflake OAuth Resource.
<OAUTH_CLIENT_ID> and <OAUTH_CLIENT_SECRET> copied from Snowflake OAuth Client.
This section uses example configurations for setting up an external IdP in Snowflake. For information on setting up an external IdP in Snowflake based on your specific environment and requirements, see the Snowflake documentation.
In Snowflake, execute the following commands to create an integration for the appropriate external IdP:
create security integration external_oauth_okta_2
type = external_oauth
enabled = true
external_oauth_type = okta
external_oauth_issuer = '<OKTA_ISSUER>'
external_oauth_jws_keys_url = '<JWKS_URI>'
external_oauth_audience_list = ('<AUDIENCE>')
external_oauth_token_user_mapping_claim = 'sub'
external_oauth_snowflake_user_mapping_attribute = 'login_name';
CREATE OR REPLACE USER <user_name>
LOGIN_NAME = '<okta_user_name>';
alter user <user_name> set DEFAULT_ROLE = 'PUBLIC';
Grant access on the integration to the public role:
grant USE_ANY_ROLE on integration external_oauth_azure_1 to PUBLIC;
grant USE_ANY_ROLE on integration external_oauth_azure_1 to <custom_role>;
Ensure that the LOGIN_NAME of the user is the same as the Azure login. Verify using the following query in Snowflake:
DESC USER <SNOWFLAKE_LOGIN_NAME>
If the login names are different, Snowflake cannot validate the access token generated with Entra ID. In that case, use the command below to match Snowflake with Azure:
ALTER USER <SNOWFLAKE_LOGIN_NAME> SET LOGIN_NAME='<EMAIL_USED_FOR_AZURE_LOGIN>'
If you are using custom role and is not your default, use the command below to set it as your default to test connectivity:
ALTER USER <USERNAME> SET DEFAULT ROLE='<custom_role>';
After clicking Test Connection, select your OAuth provider from the dropdown—either Okta or MS Azure AD— and fill in the additional required fields.Then, click Save and sign in.
In the OAuth modal, enter your Okta or Azure username and password. Click Sign in.
To provide consent to the database client, click Allow.
If the connection is successful, the following message appears in DataRobot:
By default, Snowflake preserves the case of alphabetic characters when storing and resolving double-quoted identifiers; however, if you override this default in Snowflake, double-quoted identifiers are stored and resolved as uppercase letters. Because DataRobot is a case-sensitive platform, it's important to preserve the original case of the letters.
To avoid potential issues related to case-sensitivity, go to your Snowflake data connection in DataRobot, add the QUOTED_IDENTIFIERS_IGNORE_CASE parameter, and set the value to FALSE. See the Snowflake documentation for more details.
If you plan to set up scheduled jobs, such as refreshing datasets, key pair or basic (username/password) authentication are the recommended methods to use when connecting to Snowflake—not OAuth. When an access token is expired, it can be renewed with a refresh token without re-authentication. However, when the refresh token expires, you must re-authenticate.
When attempting to execute an operation in DataRobot, the firewall requests that you clear the IP address each time.
Add all allowed IPs for DataRobot.
See Allowed source IP addresses. If you've already added the allowed IPs, check the existing IPs for completeness.
DataRobot returns the following message when testing external OAuth Snowflake connection with Microsoft Entra ID:
AADSTS700016: Application with identifier 'aa2572f-c9e6-4e91-9eb1-dcd84c856dd2' was not found in the directory 'Azure directory "datarobot" ("azuresupportdatarobot")'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You may have sent your authentication request to the wrong tenant.
Make sure scopes were created, granted, and assigned to the resource in Azure.
DataRobot returns the following message when testing external OAuth after adding the data connection:
JDBC connect failed for jdbc:snowflake://datarobot_partner.snowflakecomputing.com?CLIENT_TIMESTAMP_TYPE_MAPPING=TIMESTAMP_NTZ&db=SANDBOX&warehouse=DEMO_WH&application=DATAROBOT&CLIENT_METADATA_REQUEST_USE_CONNECTION_CTX=false. Original error: The role requested in the connection or the default role if none was requested in the connection (ACCOUNTADMIN) is not listed in the Access Token or was filtered. Please specify another role, or contact your OAuth Authorization server administrator.
Make sure the user who is establishing a connection with Azure has default role assigned.
The default role needs to be anything other than ACCOUNTADMIN, ORGADMIN, or SECURITYADMIN. If the session:scope is created with scope:role-any, the user can log in with any role other than the admin roles stated.
DataRobot returns the following message when testing the connection:
Invalid Request: The request tokens do not match the user context. Do not copy the user context values (cookies; form fields; headers) between different requests or user sessions; always maintain the ALL of the supplied values across a complete single user flow. Failure Reasons:[Token values do not match;]
Make sure the login name of the user matches the login name in both Snowflake and Azure to map user and create access tokens.
You can alter the login name in Snowflake to match the username of Azure if it does not already match.
DataRobot returns the following error message when attempting to authenticate Snowflake credentials:
Incorrect username or password was specified.
Confirm that your parameters are valid; if they are, use the recommended driver version.
Check the username, private key, and passphrase; if all parameters are valid, use the recommended driver version from the dropdown under Show additional parameters > Driver.