-
Notifications
You must be signed in to change notification settings - Fork 480
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Okta Authenticator does not support Okta MFA #140
Comments
OKTA+MFA is not supported by the okta authenticator, but |
Thanks for the quick response! I'm trying to add snowflake SSO support to a tool I use, but the problem is that the tool creates a new Snowflake connector for each model it runs which isn't something I can easily change. This means when I run it, I end up with 10-20 browser windows opened... I was doing a little more reading, and noticed the PARAMETER_CLIENT_STORE_TEMPORARY_CREDENTIAL parameter is set to True when using external browser, but when I authenticate through the browser the 'idToken' of the response is null so nothing gets stored in the temp credentials file. I'm a bit out of my element here - is the temporary credential storage supported for external browser authentication through Okta? I followed the setup instructions for Okta at https://docs.snowflake.net/manuals/user-guide/admin-security-fed-auth-configure-idp.html#okta-setup, but I might have something misconfigured on the Okta side of things? Thanks for your help! |
@adriank-convoy please reach out the Snowflake support to enable the id token cache feature. It is still private preview but it will reduce the number of browser popups by caching the token. |
I opened a ticket this morning, thanks! |
We are using DBT CLI, and asked Snowflake support to enable the feature for us, I just wanted to add some info here:
|
I'm unable to use the snowflake python connector when using the Okta url authenticator because my organization has MFA turned on for Okta. Stepping through the auth_okta.py code, when grabbing the one time token in method _step3, the code fails to check the return's status, which is set to 'MFA_REQUIRED'. Judging from https://developer.okta.com/docs/sdk/core/python_api_sdk/api/clients/AuthClient there's an addition flow that needs to be completed when MFA is turned on.
The text was updated successfully, but these errors were encountered: