Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)
A . SCIM
B . Federated authentication
C . TLS 1.2
D . Key-pair authentication
E . OAuth
F . OCSP authentication
Answer: B, D, E
Explanation:
Snowflake supports several methods for authenticating users, including federated authentication, key-pair authentication, and OAuth. Federated authentication allows users to authenticate using their organization’s identity provider. Key-pair authentication uses a public-private key pair for secure login, and OAuth is an open standard for access delegation commonly used for token-based authentication.
Reference: Authentication policies | Snowflake Documentation, Authenticating to the server | Snowflake Documentation, External API authentication and secrets | Snowflake Documentation.
Latest COF-C02 Dumps Valid Version with 254 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund