Snowflake (Beta)
2025.06.17
Overview
Cisco Identity Intelligence can connect directly to Snowflake warehouses to gather data on user accounts, activity, and other events. These instructions will guide you through the process of connecting your Snowflake account to Identity Intelligence.
Before you begin...
Make sure you have the following:
An Identity Intelligence account with Admin permissions that can add integrations to your Identity Intelligence tenant
A Snowflake login that has
ACCOUNTADMINprivileges to grant read access to theSNOWFLAKEdatabase in your Snowflake accountThe name of your Snowflake warehouse
The values for the AWS ARN and AWS Account Id that Cisco Identity Intelligence will be using when connecting to your Snowflake account. These can be found on the Intial Setup dialog when creating a new Snowflake integration in Identity Intelligence
Configuration Steps
Provision a Identity Intelligence user in Snowflake
To provision the user, you will need to:
Create a role for Identity Intelligence to use and grant it the necessary privileges
Choose a name for the role that you will assign to the Identity Intelligence user's role
In the examples below, replace
<cii_integration_role>with the name you choose. Replace<warehouse name>with the name of your Snowflake warehouse.Using the "Query Data" UI in Snowflake, enter each of the following lines individually to provision the role:
Create a service account user identified by the AWS Workload Identity Federation and give it access to the role
Choose a name for the role that you will assign to the Identity Intelligence service account user
In the examples below, replace
<cii_service_user>with the name you choose. Replace<cii_integration_role>with the name of the role you created in the previous step. Replace<cii_lambda_arn>with the arn displayed in the Initial Setup dialog for snowflake in Identity Intelligence
Next, execute the following commands to limit access to the new service account from just the AWS account id for Identity Intelligence. Replace
<cii_wif_auth_policy>with the name you choose. Replace<cii_account_id>with the account id displayed in the Initial Setup dialog for snowflake in Identity IntelligenceNext, execute the following command to give the new service account user access to the role:
GRANT ROLE <cii_integration_role> TO USER <cii_service_user>;
If you would like to further secure Identity Intelligence's access to your warehouse by restricting the allowed IP addresses, you may also add a network policy to the user you just created. In the example below, replace the
<nat_ip>placeholders with the IPs for your region (found in the Initial Setup for Snowflake in Identity Intelligence):For more information, see the Snowflake documentation on network policies and the alter user command
Create your integration in Identity Intelligence
The last step is to create your integration in Identity Intelligence. For this, you will need:
The name of the service account user you created in Snowflake
The name of the role you assigned to the service account user in Snowflake
The account locator and region for your Snowflake account. Please note that your organization and account name will NOT work instead.
If you are having trouble finding this, you can run
SELECT current_account(), current_region();in your Snowflake account. You should see that the account is a string of letters and numbers likeSF12345and the region is something likeAWS_US_WEST_2. For these values, the combined identifier would besf12345.us-west-2.aws
The name of your Snowflake warehouse
Navigate to the Integrations page in Identity Intelligence and click "Add Integration" at the top right

Find the Snowflake tile and click "Add Integration"

Click "Complete Setup" below the instructions to go to the General Settings configuration

You should now see the form in the screenshot

Choose and enter a name for your integration within Identity Intelligence that relates to the specific Snowflake warehouse that will be monitored into the "Name" field
In the "Service Account Name for CII" field, enter the name of the service account user you created in Snowflake
In the "Service Account Role" field, enter the name of the role you assigned to the service account user in Snowflake
In the "Your Snowflake Account Identifier" field, enter the account locator and region for your Snowflake account
In the "Your Snowflake Warehouse" field, enter the name of your Snowflake warehouse
Once you have entered the necessary information, click "Connect" to initialize your Snowflake integration and begin monitoring
Enable Cortex Agent Collection for Snowflake Integration
Note: This feature is currently in Alpha. If you would like access to this feature, please contact your Duo Care team, Duo Support or open a Cisco TAC Case to enable it in your account.
To allow Identity Intelligence to collect Cortex Agent metadata and observability events, the Snowflake role used by the existing Identity Intelligence integration service account (<cii_integration_role> ) must be granted privileges for:
Agent discovery (
SHOW AGENTS IN ACCOUNT)Agent inspection (
DESCRIBE AGENT <agent_name>)Observability event reads (
SNOWFLAKE.LOCAL.AI_OBSERVABILITY_EVENTS)
Why these grants are required
Snowflake requires the executing role to have at least one privilege on each agent (
OWNERSHIP,USAGE,MONITOR, orOPERATE) forSHOW AGENTS/DESCRIBE AGENTSnowflake also requires at least one privilege on the parent database and parent schema for those commands
Access to
SNOWFLAKE.LOCAL.AI_OBSERVABILITY_EVENTSrequires AI Observability access roles, specificallySNOWFLAKE.AI_OBSERVABILITY_EVENTS_LOOKUP, and Cortex access viaSNOWFLAKE.CORTEX_USER
Configuring the required grants
Using a role that can grant the necessary permissions (typically ACCOUNTADMIN or equivalent role with required grant authority), run the following:
Verification (optional)
After grants are applied, use the following to test with the Identity Intelligence integration role:
Last updated