-
Notifications
You must be signed in to change notification settings - Fork 536
Open
Labels
featurestatus-triage_doneInitial triage done, will be further handled by the driver teamInitial triage done, will be further handled by the driver team
Description
What is the current behavior?
I'm looking to move our cli based authentication to external browser sso and client side caching via allow_id_token. Right now the credential is stored unencrypted on disk via the TEMPORARY_CREDENTIAL_FILE variable.
What is the desired behavior?
My team has questions around how secure it is to store that file unencrypted. If compromised -- could that credential could be used by a bad actor to gain access to our Snowflake account?
Is there a potential path to providing a key to encrypt the temporary credential file so it can't be read in plain text?
How would this improve snowflake-connector-python?
This would make the SSO authentication more secure
References and other background
Is this potentially calling out the same issue?
https://advisories.gitlab.com/pkg/maven/net.snowflake/snowflake-jdbc/CVE-2025-24790/
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
featurestatus-triage_doneInitial triage done, will be further handled by the driver teamInitial triage done, will be further handled by the driver team