List of questions
Related questions
Question 35 - SnowPro Core discussion
Which of the following are valid methods for authenticating users for access into Snowflake? (Select THREE)
A.
SCIM
B.
Federated authentication
C.
TLS 1.2
D.
Key-pair authentication
E.
OAuth
F.
OCSP authentication
Your answer:
0 comments
Sorted by
Leave a comment first