Snowflake’s New Authentication Requirements: Free Checklist & Guide

By Ido Arieli Noga

In 2025, Snowflake security isn’t “a concern”  –  it’s a mandate. After the 2024 breach exposed major customer data due to weak credential hygiene and lack of MFA, Snowflake is implementing progressive authentication improvements to enhance protections, and there’s no opting out. 

This is a fundamental shift. Single-factor authentication is being deprecated. Native passwords for service users? Gone. MFA for all human users? Mandatory.

If you’re running a data platform on Snowflake and you’re not planning for this rollout, you’ll want to read on so you can catch up with these new updates. .

What’s Changing: Passwords Are Out, Strong Auth is In

Snowflake is deprecating single-factor password-based sign-ins across all human and service users. The transition is being rolled out via a series of Behavior Change Releases (BCRs). These aren’t optional. Once the bundles are enabled, the policies are enforced. 

Note: this doesn’t apply to reader, trial, or Open Catalog accounts  –  but if you’re running production workloads or pipelines, you’re in scope, so prepare accordingly.

Who’s Affected: Human vs. Service Users

Snowflake distinguishes users by the TYPE attribute:

  • TYPE = PERSON: Human users (default if unset)
  • TYPE = SERVICE: Programmatic/service users
  • TYPE = LEGACY_SERVICE: Transitional user type (temporary use of passwords for services, being deprecated)

What this means:

  • Human users will be forced into MFA when authenticating via password.
  • Service users will be blocked from password-based login entirely. Only OAuth or key-pair auth will be allowed.

This change reflects a broader shift in the cloud security landscape. Credentials are the #1 attack vector in nearly every breach report published in the last five years. Snowflake is drawing a hard line to eliminate them.

Timeline: When the Changes Take Effect

For Human Users:

  • May – July 2025: Mandatory MFA for all Snowsight users (existing + new)
  • Aug – Oct 2025: MFA required for all newly created human users (not just Snowsight)
  • Mar – May 2026: Mandatory MFA for all human users, no exceptions

For Service Users:

  • Nov 2025 – Jan 2026: No new LEGACY_SERVICE users can be created
  • June – Aug 2026: All remaining LEGACY_SERVICE users blocked. Key-pair or OAuth required

These timelines are tied to Snowflake’s monthly BCR bundle lifecycle. But don’t wait. You need to be proactive now to avoid outages, especially for automated pipelines and embedded workloads.

What You Should Be Doing (Now)

1. Set User Types

Use ALTER USER to explicitly define PERSON or SERVICE. Don’t rely on default behavior.

ALTER USER user1 SET TYPE = PERSON;

ALTER USER svc_user1 SET TYPE = SERVICE;

This step alone can prevent accidental policy enforcement on automation users and clarify future access methods.

2. Audit Your Risky Users

Use the Trust Center to run queries that identify accounts:

  • With passwords
  • Without MFA
  • Using LEGACY_SERVICE

Extend this with queries for service users and distribution across authentication methods. Start categorizing:

  • Who can be migrated?
  • Who’s blocked by legacy system limitations?
  • Who’s not in use anymore?

3. Migrate Service Accounts to Key-Pair or OAuth

OAuth is the preferred method for programmatic access due to its short-lived, scoped tokens. Key-pair auth is allowed but must be rotated regularly and combined with network controls.

CREATE AUTHENTICATION POLICY programmatic_auth

  AUTHENTICATION_METHODS = ('OAUTH');

ALTER USER svc_user1 SET AUTHENTICATION POLICY = programmatic_auth;

Also enforce IP-based or VPCE-based network policies:

CREATE NETWORK POLICY secure_net_policy

  ALLOWED_IP_LIST = ('10.0.0.0/8');

ALTER USER svc_user1 SET NETWORK_POLICY = secure_net_policy;

4. Enforce MFA Across the Board

You don’t need to wait for Snowflake to enforce MFA. Apply your own authentication policy now:

CREATE AUTHENTICATION POLICY require_mfa

  MFA_AUTHENTICATION_METHODS = ('PASSWORD')

  MFA_ENROLLMENT = REQUIRED;

ALTER ACCOUNT SET AUTHENTICATION POLICY = require_mfa;

This will override optional MFA for native users and lock down all TYPE = PERSON accounts that aren’t using SSO.

5. Apply Session + Network Policies

Enforce session timeouts and geofencing to reduce attack surface:

CREATE SESSION POLICY secure_session

  SESSION_IDLE_TIMEOUT_MINS = 120

  SESSION_UI_IDLE_TIMEOUT_MINS = 15;

ALTER ACCOUNT SET SESSION POLICY = secure_session;

How Yuki Streamlines Your Transition

At Yuki, we’re not just helping companies reduce Snowflake costs. We’re helping them simplpify their Snowflake authentication migration process with powerful built-in tools: 

Here’s what that looks like in practice:

  • Identify all users relying on password authentication and service accounts in need of migration
  • Highlight legacy service users and help transition them to secure identities
  • Audit MFA enablement and apply prebuilt authentication policies
  • Monitor login history and Trust Center findings in one place

And we do it all inside your cloud. Your data never leaves your VPC. We operate as a zero-trust-aligned system that integrates seamlessly into your existing stack, completely automated with no weeks of dev work needed.

Need help preparing for this new security landscape? Our Snowflake experts can help

Snowflake’s Long-Term Security Vision: Federated Auth Everywhere

Snowflake’s long-term direction is clear: adopt federated identity everywhere. In 2025 and beyond, Snowflake will:

  • Support passkeys + authenticator apps (beyond DUO)
  • Improve native OAuth support for connectors + drivers
  • Enhance the Trust Center with org-wide insights, ML-based anomaly detection, and alerting
  • Enable workload identity via cloud-native roles (e.g., AWS IAM, Azure Managed Identity)
  • Expand mTLS support for secure bi-directional connections

These changes will reduce password reliance to near-zero. Snowflake wants to be passwordless by design  –  and we agree. This is the best way to guarantee complete data security for your Snowflake setup. 

The Bigger Picture: Security, Not Just Compliance

Snowflake’s security update isn’t just about checking a compliance box. It’s about:

  • Reducing your blast radius
  • Preventing silent failures in ETL pipelines
  • Maintaining availability during vendor outages
  • Supporting zero-trust enterprise standards

A Snowflake security failure today is a data breach headline tomorrow. You’re protecting:

  • Customer data
  • Financial insights
  • Competitive models and IP

We can’t afford to take shortcuts.

Free Snowflake Security Update Checklist: Is Your Org Ready?

TASKSTATUS
Define all users by TYPE (PERSON, SERVICE)
Audit for password-only users via Trust Center
Migrate all LEGACY_SERVICE users
Apply account-level MFA enforcement
Apply key-pair or OAuth auth for services
Apply session + network policies
Monitor with Trust Center weekly
Test for break-glass scenarios
Remove unused users and credentials

TL;DR: Snowflake Is Moving. Are You?

Passwords are being deprecated.

MFA is mandatory.

Service users must migrate.

The timelines are already public. The bundles are already shipping. Your environment needs to move with them.

Yuki makes this easy, fast, and secure. If you want help auditing your Snowflake environment, enforcing MFA, migrating to key-pair or OAuth, and aligning with best practices  –  let’s talk.

Request your Snowflake security audit

Because in the end, better security isn’t just protection. It’s prevention.

Picture of Ido Arieli Noga
Ido Arieli Noga
From DevOps and FinOps to Data Architecture and BI leadership, my focus has always been the same: operational efficiency. I started in a well-funded government unit, shifted to a lean startup, and now with Yuki, I’m taking efficiency to the next level. As a founder, I believe in living in two time zones at once: acting fast today while building for tomorrow.

On this page

Free Snowflake Efficiency Report

Explore More

Snowflake Search Optimization Service: 2025 Setup & Cost Guide

Tired of slow, expensive queries in Snowflake?
Snowflake’s Search Optimization Service (SOS) can reduce query times by up to 95%—but only if implemented strategically. In this guide, you’ll learn exactly how SOS works, how to apply it to the right tables and columns, and how to avoid common mistakes that cost time and money. Whether you’re running selective lookups, geospatial queries, or substring searches, this post walks you through real-world tips, SQL examples, and cost-saving best practices—plus how tools like Yuki can automate the entire process.

Read More »

We Value Your Privacy

We use cookies to enhance your browsing experience and analyze site traffic. By continuing to use our site, you agree to our Privacy Policy .
Skip to content