snowflakeSnowflake (Beta)

2025.06.17

Overview

Cisco Identity Intelligence can connect directly to Snowflake warehouses to gather data on user accounts, activity, and other events. These instructions will guide you through the process of connecting your Snowflake account to Identity Intelligence.

Before you begin...

Make sure you have the following:

  • An Identity Intelligence account with Admin permissions that can add integrations to your Identity Intelligence tenant

  • A Snowflake login that has ACCOUNTADMIN privileges to grant read access to the SNOWFLAKE database in your Snowflake account

  • The name of your Snowflake warehouse

  • The values for the AWS ARN and AWS Account Id that Cisco Identity Intelligence will be using when connecting to your Snowflake account. These can be found on the Intial Setup dialog when creating a new Snowflake integration in Identity Intelligence

Configuration Steps

Provision a Identity Intelligence user in Snowflake

To provision the user, you will need to:

  1. Create a role for Identity Intelligence to use and grant it the necessary privileges

    1. Choose a name for the role that you will assign to the Identity Intelligence user's role

    2. In the examples below, replace <cii_integration_role> with the name you choose. Replace <warehouse name> with the name of your Snowflake warehouse.

    3. Using the "Query Data" UI in Snowflake, enter each of the following lines individually to provision the role:

  1. Create a service account user identified by the AWS Workload Identity Federation and give it access to the role

    1. Choose a name for the role that you will assign to the Identity Intelligence service account user

    2. In the examples below, replace <cii_service_user> with the name you choose. Replace <cii_integration_role> with the name of the role you created in the previous step. Replace <cii_lambda_arn> with the arn displayed in the Initial Setup dialog for snowflake in Identity Intelligence

  2. Next, execute the following commands to limit access to the new service account from just the AWS account id for Identity Intelligence. Replace <cii_wif_auth_policy> with the name you choose. Replace <cii_account_id> with the account id displayed in the Initial Setup dialog for snowflake in Identity Intelligence

  3. Next, execute the following command to give the new service account user access to the role:

    1. GRANT ROLE <cii_integration_role> TO USER <cii_service_user>;

  4. If you would like to further secure Identity Intelligence's access to your warehouse by restricting the allowed IP addresses, you may also add a network policy to the user you just created. In the example below, replace the <nat_ip> placeholders with the IPs for your region (found in the Initial Setup for Snowflake in Identity Intelligence):

    1. For more information, see the Snowflake documentation on network policiesarrow-up-right and the alter user commandarrow-up-right

Create your integration in Identity Intelligence

The last step is to create your integration in Identity Intelligence. For this, you will need:

  • The name of the service account user you created in Snowflake

  • The name of the role you assigned to the service account user in Snowflake

  • The account locator and regionarrow-up-right for your Snowflake account. Please note that your organization and account name will NOT work instead.

    • If you are having trouble finding this, you can run SELECT current_account(), current_region(); in your Snowflake account. You should see that the account is a string of letters and numbers like SF12345 and the region is something like AWS_US_WEST_2. For these values, the combined identifier would be sf12345.us-west-2.aws

  • The name of your Snowflake warehouse

  1. Navigate to the Integrations page in Identity Intelligence and click "Add Integration" at the top right

  1. Find the Snowflake tile and click "Add Integration"

  1. Click "Complete Setup" below the instructions to go to the General Settings configuration

  1. You should now see the form in the screenshot

  1. Choose and enter a name for your integration within Identity Intelligence that relates to the specific Snowflake warehouse that will be monitored into the "Name" field

  2. In the "Service Account Name for CII" field, enter the name of the service account user you created in Snowflake

  3. In the "Service Account Role" field, enter the name of the role you assigned to the service account user in Snowflake

  4. In the "Your Snowflake Account Identifier" field, enter the account locator and regionarrow-up-right for your Snowflake account

  5. In the "Your Snowflake Warehouse" field, enter the name of your Snowflake warehouse

  6. Once you have entered the necessary information, click "Connect" to initialize your Snowflake integration and begin monitoring

Enable Cortex Agent Collection for Snowflake Integration

circle-info

Note: This feature is currently in Alpha. If you would like access to this feature, please contact your Duo Care team, Duo Support or open a Cisco TAC Case to enable it in your account.

To allow Identity Intelligence to collect Cortex Agent metadata and observability events, the Snowflake role used by the existing Identity Intelligence integration service account (<cii_integration_role> ) must be granted privileges for:

Why these grants are required

  • Snowflake requires the executing role to have at least one privilege on each agent (OWNERSHIP, USAGE, MONITOR, or OPERATE) for SHOW AGENTS / DESCRIBE AGENT

  • Snowflake also requires at least one privilege on the parent database and parent schema for those commands

  • Access to SNOWFLAKE.LOCAL.AI_OBSERVABILITY_EVENTS requires AI Observability access roles, specifically SNOWFLAKE.AI_OBSERVABILITY_EVENTS_LOOKUP, and Cortex access via SNOWFLAKE.CORTEX_USER

Configuring the required grants

Using a role that can grant the necessary permissions (typically ACCOUNTADMIN or equivalent role with required grant authority), run the following:

Verification (optional)

After grants are applied, use the following to test with the Identity Intelligence integration role:

Last updated