-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SNOW-715504: MFA token cache support #988
base: master
Are you sure you want to change the base?
Conversation
6eba99f
to
69d80c7
Compare
a8dff4b
to
67089fc
Compare
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerWindowsNativeImpl.cs
Outdated
Show resolved
Hide resolved
@@ -116,13 +134,19 @@ private SFRestRequest BuildLoginRequest() | |||
{ | |||
loginName = session.properties[SFSessionProperty.USER], | |||
accountName = session.properties[SFSessionProperty.ACCOUNT], | |||
// TODO LOCAL TEST MFA temp change should be removed before merge |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why would we need to pretend to be a jdbc driver?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was only for testing it should use .NET before complete the PR
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why can't we just test as .net driver? Is there any particular reason to pretend to be a jdbc driver?
Anyway we need to remove it before merging the PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, we will do it before merging
6af9d1a
to
e36f8ed
Compare
e795b5f
to
9316bbc
Compare
9316bbc
to
43adef9
Compare
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerFileImpl.cs
Show resolved
Hide resolved
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerFileImpl.cs
Outdated
Show resolved
Hide resolved
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerWindowsNativeImpl.cs
Outdated
Show resolved
Hide resolved
3894dae
to
b1ec82b
Compare
Snowflake.Data.Tests/UnitTests/CredentialManager/SFCredentialManagerTest.cs
Outdated
Show resolved
Hide resolved
Snowflake.Data.Tests/UnitTests/CredentialManager/SFCredentialManagerTest.cs
Outdated
Show resolved
Hide resolved
Snowflake.Data.Tests/UnitTests/CredentialManager/SFCredentialManagerTest.cs
Show resolved
Hide resolved
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerFileImpl.cs
Show resolved
Hide resolved
0be7aa9
to
ce1b619
Compare
Snowflake.Data/Core/CredentialManager/Infrastructure/SFCredentialManagerFileImpl.cs
Show resolved
Hide resolved
5d32b9c
to
be6f19d
Compare
a9cec2f
to
10f124b
Compare
…n cache and passcode for MFA
…word_mfa authenticator. Added mechanism to disable or throw an error if using a different authenticator using passcode in connection.
…ection string without username_password_authentication an exception will be thrown to indicate the user that the passcode should not be used if pooling is enabled or with a minimum pool size greater than 0. Additionally, if the passcode is provided by an argument and not part of the connection string, it will not be used for the session created by the session pool, and the push MFA mechanism will be triggered.
(cherry picked from commit ac28924)
…n is expired or invalid. Multi-factor authentication (MFA) will try to use the passcode from the connection string if available; otherwise, send a Duo push notification to try to authenticate again; if it fails, the token will be removed.
7d959a3
to
3d90b4d
Compare
Description
Added support for MFA token cache.
Checklist
dotnet test
)