Secure Data Flow
Yuki’s network architecture ensures secure communication, data confidentiality, and full traceability across every stage of the query lifecycle. All data exchanges between customer systems, the Yuki Proxy, the Yuki Engine, and Snowflake are encrypted, authenticated, and monitored.

Authentication and Authorization
Each operation within Yuki services is authenticated and authorized using temporary tokens that can be invalidated upon request. Authentication integrates directly with Snowflake, ensuring that users and roles remain unchanged and continue to be managed within the customer’s Snowflake account.
Initial Authentication Process
The BI platform initiates an authentication (AUTH) request to Snowflake through the Yuki Proxy.
The Proxy recognizes the request and transparently forwards it to Snowflake.
Snowflake handles authentication, preserving all existing users, roles, and permissions.
Query Encryption and Transmission
For each query executed through Yuki:
The Yuki Proxy encrypts the query text using the SHA-256 protocol.
The encryption key is stored within the customer’s secret-management service or supported key-management system.
The encrypted query is transmitted securely to the Yuki Engine over HTTPS.
Authentication between the Proxy and Engine uses JWT tokens.
This ensures the confidentiality and integrity of all queries in motion.
Compute Resource Allocation
After receiving the encrypted query, the Yuki Engine analyzes the workload and responds to the Proxy with the most appropriate compute resource (warehouse) for execution. The Proxy then:
Adjusts session parameters according to the Engine’s recommendation.
Forwards the query to Snowflake for execution using the specified resource.
Query Execution and Result Retrieval
Snowflake executes the query under the same roles and privileges configured in the customer’s environment.
Results are returned to the Yuki Proxy, which forwards them to the BI platform for display and analysis.
No user data or query content is stored by Yuki during or after this process.
Encryption in Transit
All communication between Yuki components and external systems is protected with end-to-end encryption:
All data transmission occurs over HTTPS with strong protocol, key-exchange, and cipher standards.
Both internet and intranet connections are encrypted and authenticated.
Encryption keys for transmission are managed by Yuki and protected according to its Encryption Policy.
Security Measures
To maintain secure operations across the network:
SHA-256 encryption ensures query confidentiality and integrity.
HTTPS and JWT authentication secure communication between Yuki Proxy and Yuki Engine.
Dynamic compute-resource allocation enhances both performance and data protection.
Next Step
→ See how costs translate into real savings in the Yuki Savings Page
Last updated