Grant Yuki access to your Snowflake account

This guide explains how to grant Yuki secure, metadata-only access to your Snowflake account. You’ll create a dedicated service user, role, and warehouse, and authenticate Yuki using a key pair.

💡 Note: You don’t need to run these steps manually - our onboarding wizard will walk you through each step.


1. Network Policy (Optional)

If your Snowflake account uses a network policy, create one that allows Yuki’s IPs.

USE SCHEMA DATABASE_NAME.SCHEMA_NAME;
CREATE NETWORK POLICY yuki_policy
ALLOWED_NETWORK_RULE_LIST = ('allow_yuki_ips')
COMMENT = 'Network policy for YUKI_APPLICATION user';

CREATE NETWORK rule allow_yuki_ips
MODE = INGRESS
TYPE = IPV4
VALUE_LIST = (WAITING FOR IPS FROM BACKEND)
COMMENT = 'Allow access for YUKI_APPLICATION user from specific IPs';
Yuki’s onboarding wizard automatically generates the SQL commands below and guides you through each step.

2. Generate Key-Pair

Yuki authenticates to Snowflake using key-pair authentication (RSA). Run the following commands locally to generate your key pair.


3. Create Yuki Role, Warehouse, and Service User

Create a dedicated role, lightweight warehouse, and service user for Yuki with the required permissions.

Show SQL commands to create Yuki role, warehouse, and service user

4. Create a Data Share

Create a dedicated database and secure share so Yuki can access metadata.

Show SQL commands for data share setup

5. Snowflake Account Details

Enter the following details in the Yuki app:

  • Account Identifier

  • Cloud Provider

  • Region

  • Edition

  • Cost per Snowflake Credit

  • User, Role, and Private Key

Click Test & Save to verify the connection.


Summary

After completing this guide, Yuki will have:

  • A secure service user and role

  • A lightweight warehouse for metadata access

  • Verified key-pair authentication

  • Optional network policy for restricted IPs


Next Step

→ Continue to Deploy the Yuki Proxy to complete the setup.

Last updated