DOCUMENTATION
/
Getting Started
Guides
Developer
Reference
Releases
Tutorials
Snowflake Open Catalog
Status
  1. Overview
    • Snowflake Horizon Catalog
      • Applications and tools for connecting to Snowflake
      • Virtual warehouses
      • Databases, Tables, & Views
      • Data Types
        • Data Loading
        • Dynamic Tables
        • Streams and Tasks
        • Data Unloading
        • Migration Tools
        • Queries
        • Listings
        • Collaboration
        • Snowflake AI & ML
        • Alerts & Notifications
        • Security
            1. Authentication
            2. Authentication policies
              • Multi-factor authentication (MFA)
              • Federated authentication and SSO
              • Key-pair authentication and rotation
              • Programmatic access tokens
                • OAuth
                • API authentication and secrets
                  • Network policies and network rules
                  • Network policies
                    • Network rules
                      • Private connectivity
                      • Inbound private connectivity
                          1. AWS PrivateLink
                            • Azure Private Link
                              • Google Cloud Private Service Connect
                                • Pinning Private Connectivity Endpoints
                                  • To Snowflake internal stages
                                  • AWS VPC interface endpoints for internal stages
                                    • Azure private endpoints for internal stages
                                  • Outbound private connectivity
                                  • Administration and authorization
                                  • Trust Center
                                  • Sessions and session policies
                                  • SCIM support
                                  • Access control
                                  • Encryption
                              • Data Governance
                              • Privacy
                              • Organizations & Accounts
                              • Business continuity & data recovery
                              • Performance Optimization
                              • Cost & Billing
                              GuidesSecurityInbound private connectivityAzure Private Link

                              Azure Private Link and Snowflake¶

                              Snowflake logo in black (no text) Business Critical Feature

                              This feature requires Business Critical (or higher).

                              This topic describes how to configure Azure Private Link to connect your Azure Virtual Network (VNet) to the Snowflake VNet in Azure.

                              Note that Azure Private Link is not a service provided by Snowflake. It is a Microsoft service that Snowflake enables for use with your Snowflake account.

                              Overview¶

                              Azure Private Link provides private connectivity to Snowflake by ensuring that access to Snowflake is through a private IP address. Traffic can only occur from the customer virtual network (VNet) to the Snowflake VNet using the Microsoft backbone and avoids the public Internet. This significantly simplifies the network configuration by keeping access rules private while providing secure and private communication.

                              The following diagram summarizes the Azure Private Link architecture with respect to the customer VNet and the Snowflake VNet.

                              From either a virtual machine (1) or through peering (2), you can connect to the Azure Private Link endpoint (3) in your virtual network. That endpoint then connects to the Private Link Service (4) and routes to Snowflake.

                              Architecture overview

                              Here are the high-level steps to integrate Snowflake with Azure Private Link:

                              1. Create a Private Endpoint.

                              2. Generate and retrieve an access token from your Azure subscription.

                                Note that if you plan to use Azure Private Link to connect to a Snowflake internal stage on Azure, you must register your subscription with the Azure Storage resource provider before connecting to the internal stage from a private endpoint.

                              3. Enable your Snowflake account on Azure to use Azure Private Link.

                              4. Update your outbound firewall settings to allow the Snowflake account URL and OCSP URL.

                              5. Update your DNS server to resolve your account URL and OCSP URL to the Private Link IP address. You can add the DNS entry to your on-premises DNS server or private DNS on your VNet, and use DNS forwarding to direct queries for the entry from other locations where your users will access Snowflake.

                              6. After the Private Endpoint displays a CONNECTION STATE value of Approved, test your connection to Snowflake with SnowCD (Connectivity Diagnostic Tool) and SYSTEM$ALLOWLIST_PRIVATELINK.

                              7. Connect to Snowflake using your private connectivity account URL.

                              To further harden your security posture, Snowflake recommends Pinning private connectivity endpoints for inbound traffic for your Snowflake account.

                              Requirements and limitations¶

                              Before attempting to configure Azure Private Link to connect your Azure VNet to the Snowflake VNet on Azure, note the following:

                              • In Azure at the subnet level, optionally enable a network policy for the Private Endpoint.

                                Verify that the TCP ports 443 and 80 allow traffic to 0.0.0.0 in the network security group of the Private Endpoint network card.

                                For help with the port configuration, contact your internal Azure administrator.

                              • Use ARM VNets.

                              • Use IPv4 TCP traffic only.

                              • Currently, the self-service enablement process described in this topic does not support authorizing a managed Private Endpoint from Azure Data Factory, Synapse, or other managed services.

                                For details on how to configure a managed private endpoint for this use case, see this article (in the Snowflake community).

                              For more information on the requirements and limitations of Microsoft Azure Private Link, see the Microsoft documentation on Private Endpoint Limitations and Private Link Service Limitations.

                              Configure access to Snowflake with Azure Private Link¶

                              Attention

                              This section only covers the Snowflake-specific details for configuring your VNet environment. Also, note that Snowflake is not responsible for the actual configuration of the required firewall updates and DNS records. If you encounter issues with any of these configuration tasks, please contact Microsoft Support directly.

                              This section describes how to configure your Azure VNet to connect to the Snowflake VNet on Azure using Azure Private Link. After initiating the connection to Snowflake using Azure Private Link, you can determine the approval state of the connection in the Azure portal.

                              For installation help, see the Microsoft documentation for the Azure CLI or Azure PowerShell.

                              Complete the configuration procedure to configure your Microsoft Azure VNet and initiate the Azure Private Link connection to Snowflake.

                              Procedure¶

                              This procedure manually creates and initializes the necessary Azure Private Link resources to use Azure Private Link to connect to Snowflake on Azure. Note that this procedure assumes that your use case does not involve Using SSO with Azure Private Link (in this topic).

                              1. As a representative example using the Azure CLI, execute az account list --output table. Note the output values in the Name, SubscriptionID and CloudName columns.

                                Name     CloudName   SubscriptionId                        State    IsDefault
                                -------  ----------  ------------------------------------  -------  ----------
                                MyCloud  AzureCloud  13c...                                Enabled  True
                                
                                Copy
                              2. Navigate to the Azure portal. Search for Private Link and click Private Link.

                                Private Link Preview
                              3. Click Private endpoints and then click Add.

                                Select Private link endpoint

                              #. In the Basics section, complete the Subscription, Resource group, Name, and Region fields for your environment and then click Next: Resource.

                              Endpoint Basics
                              1. In the Resource section, complete the Connection method and the Resource ID or alias Field fields.

                                • For Connection Method, select the Connect to an Azure resource by resource ID or alias.

                                  Endpoint Resource
                                • In Snowflake, execute SYSTEM$GET_PRIVATELINK_CONFIG and input the value for privatelink-pls-id into the Resource ID or alias field. Note that the screenshot in this step uses the alias value for the east-us-2 region as a representative example, and that Azure confirms a valid alias value with a green checkmark.

                                • If you receive an error message regarding the alias value, contact Snowflake Support to receive the resource ID value and then repeat this step using the resource ID value.

                              2. Return to the Private endpoints section and allow a few minutes to wait. On approval, the Private Endpoint displays a CONNECTION STATE value of Pending. This value will update to Approved after completing the authorization in the next step.

                                Endpoint approved state
                              3. Enable your Snowflake account on Azure to use Azure Private Link by completing the following steps:

                                • In your command line environment, record the private endpoint resource ID value using the following Azure CLI network command:

                                  az network private-endpoint show
                                  
                                  Copy

                                  The private endpoint was created in the previous steps using the template files. The resource ID value takes the following form, which has a truncated value:

                                  /subscriptions/26d.../resourcegroups/sf-1/providers/microsoft.network/privateendpoints/test-self-service

                                • In your command line environment, execute the following Azure CLI account command and save the output. The output will be used as the value for the federated_token argument in the next step.

                                  az account get-access-token --subscription <SubscriptionID>
                                  
                                  Copy

                                  Extract the access token value from the command output. This value will be used as the federated_token value in the next step. In this example, the values are truncated and the access token value is eyJ...:

                                  {
                                     "accessToken": "eyJ...",
                                     "expiresOn": "2021-05-21 21:38:31.401332",
                                     "subscription": "0cc...",
                                     "tenant": "d47...",
                                     "tokenType": "Bearer"
                                   }
                                  
                                  Copy

                                  Important

                                  The user generating the Azure access Token must have Read permissions on the Subscription. The least privilege permission is Microsoft.Subscription/subscriptions/acceptOwnershipStatus/read. Alternatively, the default role Reader grants more coarse-grained permissions.

                                  The accessToken value is sensitive information and should be treated like a password value — do not share this value.

                                  If it is necessary to contact Snowflake Support, redact the access token from any commands and URLs before creating a support ticket.

                                • In Snowflake, call the SYSTEM$AUTHORIZE_PRIVATELINK function, using the private-endpoint-resource-id value and the federated_token value as arguments, which are truncated in this example:

                                  USE ROLE ACCOUNTADMIN;
                                  
                                  SELECT SYSTEM$AUTHORIZE_PRIVATELINK (
                                    '/subscriptions/26d.../resourcegroups/sf-1/providers/microsoft.network/privateendpoints/test-self-service',
                                    'eyJ...'
                                    );
                                  
                                  Copy

                                To verify your authorized configuration, call the SYSTEM$GET_PRIVATELINK function in your Snowflake account on Azure. Snowflake returns Account is authorized for PrivateLink. for a successful authorization.

                                If it is necessary to disable Azure Private Link in your Snowflake account, call the SYSTEM$REVOKE_PRIVATELINK function, using the argument values for private-endpoint-resource-id and federated_token.

                              4. DNS Setup. All requests to Snowflake need to be routed via the Private Endpoint. Update your DNS to resolve the Snowflake account and OCSP URLs to the private IP address of your Private Endpoint.

                                • To get the endpoint IP address, navigate to Azure portal search bar and enter the name of the endpoint (i.e. the NAME value from Step 5). Locate the Network Interface result and click it.

                                  DNS endpoint setup
                                • Copy the value for the Private IP address (i.e. 10.0.27.5).

                                  DNS private IP address
                                • Configure your DNS to have the appropriate endpoint values from the SYSTEM$GET_PRIVATELINK_CONFIG function resolve to the private IP address.

                                  The values to obtain from the output of SYSTEM$GET_PRIVATELINK_CONFIG depend on which Snowflake features you are accessing via private connectivity. For a description of the possible values, see Return values.

                                  Note that the values for regionless-snowsight-privatelink-url and snowsight-privatelink-url allow access to Snowsight and the Snowflake Marketplace using private connectivity. However, there is additional configuration if you want to enable URL redirects. For information, see Snowsight & Private Connectivity.

                                  Note

                                  A full explanation of DNS configuration is beyond the scope of this procedure. For example, you can choose to integrate an Azure Private DNS zone into your environment. Please consult your internal Azure and Cloud Infrastructure administrators to configure and resolve the URLs in DNS properly.

                              5. After verifying your outbound firewall settings and DNS records include your Azure Private Link account and OCSP URLs, test your connection to Snowflake with SnowCD (Connectivity Diagnostic Tool) and SYSTEM$ALLOWLIST_PRIVATELINK.

                              6. Connect to Snowflake with your private connectivity account URL.

                                Note that if you want to connect to Snowsight via Azure Private Link, follow the instructions in the Snowsight documentation.

                              Using SSO with Azure Private Link¶

                              Snowflake supports using SSO with Azure Private Link. For more information, see:

                              • SSO with private connectivity

                              • Partner applications

                              Using Client Redirect with Azure Private Link¶

                              Snowflake supports using Client Redirect with Azure Private Link.

                              For more information, see Redirecting client connections.

                              Using replication and Tri-Secret Secure with private connectivity¶

                              Snowflake supports replicating your data from the source account to the target account, regardless of whether you enable Tri-Secret Secure or this feature in the target account.

                              Blocking public access — Recommended¶

                              After testing the Azure Private Link connectivity with Snowflake, you can optionally block public access to Snowflake using Controlling network traffic with network policies.

                              Configure the CIDR block range to block public access to Snowflake using your organization’s IP address range. This range can be from within your virtual network.

                              Once the CIDR Block ranges are set, only IP addresses within the CIDR block range can access Snowflake.

                              To block public access using a network policy:

                              1. Create a new network policy or edit an existing network policy. Add the CIDR block range for your organization.

                              2. Activate the network policy for your account.

                              Was this page helpful?

                              Visit Snowflake
                              Join the conversation
                              Develop with Snowflake
                              Share your feedback
                              Read the latest on our blog
                              Get your own certification
                              Privacy NoticeSite Terms© 2025 Snowflake, Inc. All Rights Reserved.
                              1. Overview
                              2. Configure access to Snowflake with Azure Private Link
                              3. Using SSO with Azure Private Link
                              4. Using Client Redirect with Azure Private Link
                              5. Using replication and Tri-Secret Secure with private connectivity
                              6. Blocking public access — Recommended
                              1. SnowCD
                              2. SYSTEM$ALLOWLIST_PRIVATELINK
                              3. SYSTEM$GET_PRIVATELINK_CONFIG
                              Language: English
                              • English
                              • Français
                              • Deutsch
                              • 日本語
                              • 한국어
                              • Português