Skip to content

Commit 03067c0

Browse files
authored
Merge pull request #111352 from tamram/tamram-0413
add section on how to specify auth for blob upload
2 parents 15ca65e + 815a998 commit 03067c0

File tree

3 files changed

+23
-8
lines changed

3 files changed

+23
-8
lines changed
31.1 KB
Loading

articles/storage/common/storage-access-blobs-queues-portal.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 01/10/2020
10+
ms.date: 04/14/2020
1111
ms.author: tamram
1212
ms.reviewer: cbrooks
1313
ms.subservice: common
@@ -17,11 +17,13 @@ ms.subservice: common
1717

1818
When you access blob or queue data using the [Azure portal](https://portal.azure.com), the portal makes requests to Azure Storage under the covers. A request to Azure Storage can be authorized using either your Azure AD account or the storage account access key. The portal indicates which method you are using, and enables you to switch between the two if you have the appropriate permissions.
1919

20+
You can also specify how to authorize an individual blob upload operation in the Azure portal. By default the portal uses whichever method you are already using to authorize a blob upload operation, but you have the option to change this setting when you upload a blob.
21+
2022
## Permissions needed to access blob or queue data
2123

2224
Depending on how you want to authorize access to blob or queue data in the Azure portal, you'll need specific permissions. In most cases, these permissions are provided via role-based access control (RBAC). For more information about RBAC, see [What is role-based access control (RBAC)?](../../role-based-access-control/overview.md).
2325

24-
### Account access key
26+
### Use the account access key
2527

2628
To access blob and queue data with the account access key, you must have an RBAC role assigned to you that includes the RBAC action **Microsoft.Storage/storageAccounts/listkeys/action**. This RBAC role may be a built-in or a custom role. Built-in roles that support **Microsoft.Storage/storageAccounts/listkeys/action** include:
2729

@@ -32,9 +34,9 @@ To access blob and queue data with the account access key, you must have an RBAC
3234
When you attempt to access blob or queue data in the Azure portal, the portal first checks whether you have been assigned a role with **Microsoft.Storage/storageAccounts/listkeys/action**. If you have been assigned a role with this action, then the portal uses the account key for accessing blob and queue data. If you have not been assigned a role with this action, then the portal attempts to access data using your Azure AD account.
3335

3436
> [!NOTE]
35-
> The classic subscription administrator roles Service Administrator and Co-Administrator include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action**, so a user with one of these administrative roles can also access blob and queue data with the account key. For more information, see [Classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
37+
> The classic subscription administrator roles Service Administrator and Co-Administrator include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action**, so a user with one of these administrative roles can also access blob and queue data with the account key. For more information, see [Classic subscription administrator roles, Azure RBAC roles, and Azure AD administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
3638
37-
### Azure AD account
39+
### Use your Azure AD account
3840

3941
To access blob or queue data from the Azure portal using your Azure AD account, both of the following statements must be true for you:
4042

@@ -50,7 +52,7 @@ The built-in roles that support access to your blob or queue data include:
5052
- [Storage Blob Data Reader](../../role-based-access-control/built-in-roles.md#storage-blob-data-reader): Read-only permissions for blobs.
5153
- [Storage Queue Data Contributor](../../role-based-access-control/built-in-roles.md#storage-queue-data-contributor): Read/write/delete permissions for queues.
5254
- [Storage Queue Data Reader](../../role-based-access-control/built-in-roles.md#storage-queue-data-reader): Read-only permissions for queues.
53-
55+
5456
Custom roles can support different combinations of the same permissions provided by the built-in roles. For more information about creating custom RBAC roles, see [Custom roles for Azure resources](../../role-based-access-control/custom-roles.md) and [Understand role definitions for Azure resources](../../role-based-access-control/role-definitions.md).
5557

5658
Listing queues with a classic subscription administrator role is not supported. To list queues, a user must have assigned to them the Azure Resource Manager **Reader** role, the **Storage Queue Data Reader** role, or the **Storage Queue Data Contributor** role.
@@ -70,7 +72,7 @@ When you navigate to a container or a queue, the Azure portal indicates whether
7072

7173
The examples in this section show accessing a container and its blobs, but the portal displays the same message when you are accessing a queue and its messages, or listing queues.
7274

73-
### Account access key
75+
### Authenticate with the account access key
7476

7577
If you are authenticating using the account access key, you'll see **Access Key** specified as the authentication method in the portal:
7678

@@ -82,7 +84,7 @@ To switch to using Azure AD account, click the link highlighted in the image. If
8284

8385
Notice that no blobs appear in the list if your Azure AD account lacks permissions to view them. Click on the **Switch to access key** link to use the access key for authentication again.
8486

85-
### Azure AD account
87+
### Authenticate with your Azure AD account
8688

8789
If you are authenticating using your Azure AD account, you'll see **Azure AD User Account** specified as the authentication method in the portal:
8890

@@ -94,6 +96,19 @@ To switch to using the account access key, click the link highlighted in the ima
9496

9597
Notice that no blobs appear in the list if you do not have access to the account keys. Click on the **Switch to Azure AD User Account** link to use your Azure AD account for authentication again.
9698

99+
## Specify how to authorize a blob upload operation
100+
101+
When you upload a blob from the Azure portal, you can specify whether to authenticate and authorize that operation with the account access key or with your Azure AD credentials. By default, the portal uses the current authentication method, as shown in [Determine the current authentication method](#determine-the-current-authentication-method).
102+
103+
To specify how to authorize a blob upload operation, follow these steps:
104+
105+
1. In the Azure portal, navigate to the container where you wish to upload a blob.
106+
1. Select the **Upload** button.
107+
1. Expand the **Advanced** section to display the advanced properties for the blob.
108+
1. In the **Authentication Type** field, indicate whether you want to authorize the upload operation by using your Azure AD account or with the account access key, as shown in the following image:
109+
110+
:::image type="content" source="media/storage-access-blobs-queues-portal/auth-blob-upload.png" alt-text="Screenshot showing how to change authorization method on blob upload":::
111+
97112
## Next steps
98113

99114
- [Authenticate access to Azure blobs and queues using Azure Active Directory](storage-auth-aad.md)

articles/storage/common/storage-redundancy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ A write operation is first committed to the primary location and replicated usin
9696

9797
Geo-zone-redundant storage (GZRS) (preview) combines the high availability provided by redundancy across availability zones with protection from regional outages provided by geo-replication. Data in a GZRS storage account is copied across three [Azure availability zones](../../availability-zones/az-overview.md) in the primary region and is also replicated to a secondary geographic region for protection from regional disasters. Microsoft recommends using GZRS for applications requiring maximum consistency, durability, and availability, excellent performance, and resilience for disaster recovery.
9898

99-
With a GZRS storage account, you can continue to read and write data if an availability zone becomes unavailable or is unrecoverable. Additionally, your data is also durable in the case of a complete regional outage or a disaster in which the primary region isnt recoverable. GZRS is designed to provide at least 99.99999999999999% (16 9's) durability of objects over a given year.
99+
With a GZRS storage account, you can continue to read and write data if an availability zone becomes unavailable or is unrecoverable. Additionally, your data is also durable in the case of a complete regional outage or a disaster in which the primary region isn't recoverable. GZRS is designed to provide at least 99.99999999999999% (16 9's) durability of objects over a given year.
100100

101101
Only general-purpose v2 storage accounts support GZRS and RA-GZRS. For more information about storage account types, see [Azure storage account overview](storage-account-overview.md). GZRS and RA-GZRS support block blobs, page blobs (except for VHD disks), files, tables, and queues.
102102

0 commit comments

Comments
 (0)