CREATE ROW ACCESS POLICY¶
Creates a new row access policy in the current/specified schema or replaces an existing row access policy.
After creating a row access policy, add the policy to a table using an ALTER TABLE command or a view using an ALTER VIEW command.
- See also:
Syntax¶
Snowflake supports the following syntax to create a row access policy.
CREATE [ OR REPLACE ] ROW ACCESS POLICY [ IF NOT EXISTS ] <name> AS
( <arg_name> <arg_type> [ , ... ] ) RETURNS BOOLEAN -> <body>
[ COMMENT = '<string_literal>' ]
Required parameters¶
name
Identifier for the row access policy; must be unique for your schema.
The identifier value must start with an alphabetic character and cannot contain spaces or special characters unless the entire identifier string is enclosed in double quotes (e.g. “My object”). Identifiers enclosed in double quotes are also case-sensitive.
For more details, see Identifier requirements
AS ( <arg_name> <arg_type> [ , ... ] )
The signature for the row access policy.
A signature specifies a set of attributes that must be considered to determine whether the row is accessible. The attribute values come from the database object (e.g. table or view) to be protected by the row access policy.
RETURNS BOOLEAN
A row access policy must evaluate to true or false. A user that queries a table protected by a row access policy sees rows in the output based on how the
body
is written.body
SQL expression that operates on the argument values in the signature to determine which rows to return for a query on a table that is protected by a row access policy.
The
body
can be any boolean-valued SQL expression. Snowflake supports expressions that invoke User-defined functions overview, Writing external functions, and expressions that use sub-queries.
Optional parameters¶
COMMENT = 'string_literal'
Specifies a comment for the row access policy.
Default: No value
Access control requirements¶
A role used to execute this SQL command must have the following privileges at a minimum:
Privilege |
Object |
Notes |
---|---|---|
CREATE ROW ACCESS POLICY |
Schema |
Note that operating on any object in a schema also requires the USAGE privilege on the parent database and schema.
For instructions on creating a custom role with a specified set of privileges, see Creating custom roles.
For general information about roles and privilege grants for performing SQL actions on securable objects, see Overview of Access Control.
For additional details on masking policy DDL and privileges, see Managing Column-level Security.
Usage notes¶
Including one or more subqueries in the policy body may cause errors. When possible, limit the number of subqueries, limit the number of JOIN operations, and simplify WHERE clause conditions.
If a database object has both a row access policy and one or more masking policy, the row access policy is evaluated first.
For more information on row access policies during query runtime, see Understanding row access policies.
A given table or view column can be specified in either a masking policy signature or a row access policy signature. In other words, the same column cannot be specified in both a masking policy signature and a row access policy signature at the same time.
For more information, see CREATE MASKING POLICY.
You cannot change the policy signature (i.e. argument name or input/output data type) using CREATE OR REPLACE ROW ACCESS POLICY if the policy is attached to a table or view, or using ALTER ROW ACCESS POLICY. If you need to change the signature, execute a DROP ROW ACCESS POLICY statement on the policy and create a new row access policy.
If the policy
body
contains a mapping table lookup, create a centralized mapping table and store the mapping table in the same database as the protected table. This is particularly important if thebody
calls the IS_DATABASE_ROLE_IN_SESSION function. For details, see the function usage notes.A data sharing provider cannot create a row access policy in a reader account.
If you specify the CURRENT_DATABASE or CURRENT_SCHEMA function in the body of a masking or row access policy, the function returns the database or schema that contains the protected table, not the database or schema in use for the session.
Regarding metadata:
Attention
Customers should ensure that no personal data (other than for a User object), sensitive data, export-controlled data, or other regulated data is entered as metadata when using the Snowflake service. For more information, see Metadata fields in Snowflake.
CREATE OR REPLACE <object> statements are atomic. That is, when an object is replaced, the old object is deleted and the new object is created in a single transaction.
Examples¶
These examples use the CURRENT_ROLE context function. If role activation and role hierarchy is necessary in the policy conditions, use IS_ROLE_IN_SESSION.
The following row access policy allows users whose CURRENT_ROLE is the it_admin
custom role to see rows that contain the
employee ID number (i.e. empl_id
) in the query result.
create or replace row access policy rap_it as (empl_id varchar) returns boolean -> case when 'it_admin' = current_role() then true else false end ;
The following row access policy allows users to view rows in the query result if either of the following two conditions are true:
The current role is the
sales_executive_role
custom role. Call the CURRENT_ROLE function to determine the current role.The current role is the
sales_manager
custom role and the query specifies asales_region
that corresponds to thesalesmanageregions
mapping table.
use role securityadmin; create or replace row access policy rap_sales_manager_regions_1 as (sales_region varchar) returns boolean -> 'sales_executive_role' = current_role() or exists ( select 1 from salesmanagerregions where sales_manager = current_role() and region = sales_region ) ;Where:
rap_sales_manager_regions_1
The name of the row access policy.
as (sales_region varchar)
The signature for the row access policy.
A signature specifies a set of attributes that must be considered to determine whether the row is accessible. The attribute values come from the table to be protected by the row access policy.
returns boolean ->
Specifies the application of the row access policy.
Note that the
<expression>
of the row access policy immediately follows the right-arrow (i.e.->
).The expression can be any boolean-valued SQL expression. Snowflake supports expressions that invoke UDFs, External Functions, and expressions that use subqueries.
'sales_executive_role' = current_role()
The first condition of the row access policy expression that allows users with the sales_executive_role custom role to view data.
or exists (select 1 from salesmanagerregions where sales_manager = current_role() and region = sales_region)
The second condition of the row access policy expression that uses a subquery.
The subquery requires the CURRENT_ROLE to be the sales_manager custom role with the executed query on the data to specify a region listed in the
salesmanagerregions
mapping table.
The following row access policy specifies two attributes in the policy signature:
create or replace row access policy rap_test2 as (n number, v varchar) returns boolean -> true;Where:
rap_test2
The name of the row access policy.
(n number, v varchar)
The signature for the row access policy.
A signature specifies a set of attributes that must be considered to determine whether the row is accessible. The attribute values come from the table to be protected by the row access policy.
returns boolean -> true
Determines the application of the row access policy.
The returned value determines whether the user has access to a given row on the database object to which the row access policy is added.
For additional examples, see Use row access policies.