© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. M. LarsonSnowflake Access Controlhttps://doi.org/10.1007/978-1-4842-8038-6_17

17. Upstream and Downstream Services

Jessica Megan Larson1  
(1)
Oakland, CA, USA
 

We’re getting to the last couple of chapters now that we’ve wrapped up access control within Snowflake. We’ve covered the different types of privileges that exist on the different object and container types within Snowflake. We discussed how to structure different types of roles, and how to grant them to users. We went through the ways to handle permissioning at the different levels in the object hierarchy. At this point, we’ve effectively covered all of access control inside Snowflake.

If Snowflake ...

Get Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.