© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
J. M. LarsonSnowflake Access Controlhttps://doi.org/10.1007/978-1-4842-8038-6_18

18. Managing Access Requests

Jessica Megan Larson1  
(1)
Oakland, CA, USA
 

In the last chapter, we covered how to work with upstream and downstream services that handle Snowflake data. In this final chapter, we’re going to explore how we can efficiently manage roles allocated to users. We’ve covered how to grant read, write, admin, and other types of access to roles, but now we’re shifting our focus to how we handle these requests at scale. We’re going to go in order of operations, first covering how we can initially create and populate a role. Then we’ll cover how a user might ...

Get Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.