In the last chapter, we covered how to work with upstream and downstream services that handle Snowflake data. In this final chapter, we’re going to explore how we can efficiently manage roles allocated to users. We’ve covered how to grant read, write, admin, and other types of access to roles, but now we’re shifting our focus to how we handle these requests at scale. We’re going to go in order of operations, first covering how we can initially create and populate a role. Then we’ll cover how a user might ...
18. Managing Access Requests
Get Snowflake Access Control: Mastering the Features for Data Privacy and Regulatory Compliance now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.