Skip to content

SNOW-1964017: Option to encrypt the temporary credential set during external browser auth #2200

@jsnb-devoted

Description

@jsnb-devoted

What is the current behavior?

I'm looking to move our cli based authentication to external browser sso and client side caching via allow_id_token. Right now the credential is stored unencrypted on disk via the TEMPORARY_CREDENTIAL_FILE variable.

What is the desired behavior?

My team has questions around how secure it is to store that file unencrypted. If compromised -- could that credential could be used by a bad actor to gain access to our Snowflake account?

Is there a potential path to providing a key to encrypt the temporary credential file so it can't be read in plain text?

How would this improve snowflake-connector-python?

This would make the SSO authentication more secure

References and other background

Is this potentially calling out the same issue?
https://advisories.gitlab.com/pkg/maven/net.snowflake/snowflake-jdbc/CVE-2025-24790/

Metadata

Metadata

Labels

featurestatus-triage_doneInitial triage done, will be further handled by the driver team

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions