Configuring Multi-Factor Authentication (MFA)

This guide provides a step-by-step approach to enabling and enforcing Multi-Factor Authentication (MFA) in Snowflake, offering an essential layer of security beyond passwords. It covers selecting an MFA method, configuring MFA settings, preparing users through communication and training, and implementing support structures for MFA-related issues. Adhering to these steps and best practices ensures that all users are protected by MFA, significantly enhancing Snowflake's security against unauthorized access.
Loved by leading security teams around the world.

Multi-Factor Authentication (MFA) is a critical security measure that adds an additional layer of protection beyond just passwords, significantly enhancing defense against unauthorized access. Implementing MFA in Snowflake is straightforward and crucial for safeguarding sensitive data.


  • Access to Snowflake with ACCOUNTADMIN or SECURITYADMIN role.
  • Familiarity with your organization's chosen MFA method (e.g., SMS, authenticator app).

Step 1: Choose an MFA Method

Snowflake supports various MFA methods, including authenticator apps (such as Google Authenticator or Microsoft Authenticator) and hardware tokens. Decide on the MFA method that best fits your organization's security policies and user preferences.

Step 2: Enabling MFA in Snowflake

  1. Log into Snowflake: Use an account with ACCOUNTADMIN or SECURITYADMIN privileges.
  2. Access Account Settings: Navigate to Account → Account Settings in the Snowflake UI.
  3. Enable MFA: Find the Multi-Factor Authentication section and select the option to enable MFA. You may be prompted to choose between enabling MFA for all users or allowing users to enable MFA individually.

Step 3: Configure MFA Settings

  • After enabling MFA, configure the settings to match your security requirements. This may involve specifying the types of MFA allowed, setting up grace periods for MFA registration, and defining policies for MFA failure handling.

Step 4: Communicate and Train Users

  • Inform Users: Before enforcing MFA, communicate the change to all users, explaining the importance of MFA and providing instructions for setting it up.
  • Training Sessions: Offer training sessions or provide resources to help users understand how to register for and use MFA.

Step 5: Enforce MFA for All Users

  • Once users are informed and trained, enforce MFA for all accounts. Ensure that no user can bypass the MFA requirement, securing all entry points into Snowflake.

Step 6: Monitor and Support

  • Monitor Compliance: Regularly check that all users have MFA enabled and are compliant with the MFA policy.
  • Provide Support: Establish a support process for users who encounter issues with MFA, ensuring they can quickly regain access to their accounts if they face authentication problems.

Best Practices for MFA in Snowflake

  • Regularly Review MFA Settings: Periodically review and update your MFA settings to adapt to new security threats or changes in technology.
  • Use App-Based Tokens Where Possible: App-based tokens are generally more secure than SMS-based MFA, as they're less susceptible to interception or SIM swapping attacks.
  • Educate Users on Secure MFA Practices: Train users on securing their MFA methods, such as protecting their mobile devices and not sharing MFA tokens.
  • Plan for Device Loss: Establish procedures for users to report lost or stolen devices used for MFA to prevent unauthorized access during the device recovery period.

Configuring Multi-Factor Authentication in Snowflake is an essential step toward securing your data environment against unauthorized access. By following these steps to enable and strictly enforce MFA, alongside adopting best practices for MFA management and user education, organizations can significantly enhance their security posture and protect sensitive data within Snowflake.

Connect, Protect, Defend

Streamline your approach to security posture management throughout your entire company.
Get a Free Security Assessment
By installing or using the software, you acknowledge and agree to be bound by the Terms of Service.