-
Couldn't load subscription status.
- Fork 524
Description
What is the current behavior?
Right now, it seems like the Snowflake connector and client libraries will try to fetch the token for us, which fails to discover the user-assigned managed identity for workloads in AKS. That is probably the reason you suggest a different flow for AKS that uses service accounts instead instead of Entra ID and managed identites.
What is the desired behavior?
We can discover this user-assigned managed identity and fetch a token for it from our AKS by using the Azure identity libraries. Is it possible to provide the token manually? Does the Snowflake connector have to do it for us?
How would this improve snowflake-connector-python?
It will allow us to use managed identities to authenticate to Snowflake without needing to use service accounts in AKS directly. Since we already use managed identities for everything else, this will allow us to use the same pattern.
References and other background
No response