Data Access Management > Data access policies > Authentication methods for pushdown enforcement
  

Authentication methods for pushdown enforcement

View references to documentation for user authentication methods that you can use for pushdown enforcement of data access policies and data filter policies.
The following table lists references to documentation about the user authentication methods that you can use for pushdown enforcement of data access policies and data filter policies:
Cloud Data Platform Type
Authentication methods
Amazon Redshift
For more information about Amazon Redshift authentication, see Create a connection.
Databricks
For more information about Databricks authentication, see Create a connection.
Microsoft Fabric Data Warehouse
For more information about Microsoft Fabric Data Warehouse authentication, see Create a connection.
Microsoft Power BI
For more information about Microsoft Power BI authentication, see Create a connection.
Snowflake
For more information about Snowflake authentication, see Create a connection.