Grant Yuki access to your Snowflake account
This guide explains how to grant Yuki secure, metadata-only access to your Snowflake account. You’ll create a dedicated service user, role, and warehouse, and authenticate Yuki using a key pair.
💡 Note: You don’t need to run these steps manually - our onboarding wizard will walk you through each step.
1. Network Policy (Optional)
If your Snowflake account uses a network policy, create one that allows Yuki’s IPs.
USE SCHEMA DATABASE_NAME.SCHEMA_NAME;
CREATE NETWORK POLICY yuki_policy
ALLOWED_NETWORK_RULE_LIST = ('allow_yuki_ips')
COMMENT = 'Network policy for YUKI_APPLICATION user';
CREATE NETWORK rule allow_yuki_ips
MODE = INGRESS
TYPE = IPV4
VALUE_LIST = (WAITING FOR IPS FROM BACKEND)
COMMENT = 'Allow access for YUKI_APPLICATION user from specific IPs';
2. Generate Key-Pair
Yuki authenticates to Snowflake using key-pair authentication (RSA). Run the following commands locally to generate your key pair.
# Generate private key
openssl genrsa -out yuki_snowflake_key.pem 2048
# Extract public key
openssl rsa -in yuki_snowflake_key.pem -pubout -out yuki_snowflake_key.pub3. Create Yuki Role, Warehouse, and Service User
Create a dedicated role, lightweight warehouse, and service user for Yuki with the required permissions.
4. Create a Data Share
Create a dedicated database and secure share so Yuki can access metadata.
5. Snowflake Account Details
Enter the following details in the Yuki app:
Account Identifier
Cloud Provider
Region
Edition
Cost per Snowflake Credit
User, Role, and Private Key
Click Test & Save to verify the connection.

Summary
After completing this guide, Yuki will have:
A secure service user and role
A lightweight warehouse for metadata access
Verified key-pair authentication
Optional network policy for restricted IPs
Next Step
→ Continue to Deploy the Yuki Proxy to complete the setup.
Last updated