Skip to content

Commit 08f8746

Browse files
Merge pull request #295732 from pauljewellmsft/update-classic-account
Update/remove storage articles that reference classic accounts
2 parents cd6660d + 5146a42 commit 08f8746

10 files changed

+25
-281
lines changed

articles/storage/.openpublishing.redirection.storage.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -560,6 +560,11 @@
560560
"redirect_url": "/azure/storage/blobs/storage-quickstart-blobs-python",
561561
"redirect_document_id": false
562562
},
563+
{
564+
"source_path_from_root": "/articles/storage/blobs/anonymous-read-access-prevent-classic.md",
565+
"redirect_url": "/azure/storage/blobs/anonymous-read-access-prevent",
566+
"redirect_document_id": false
567+
},
563568
{
564569
"source_path_from_root": "/articles/storage/blobs/storage-quickstart-blobs-ruby.md",
565570
"redirect_url": "/previous-versions/azure/storage/blobs/storage-quickstart-blobs-ruby",

articles/storage/blobs/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -386,10 +386,8 @@ items:
386386
items:
387387
- name: Overview
388388
href: anonymous-read-access-overview.md
389-
- name: Remediate anonymous access (Azure Resource Manager deployments)
389+
- name: Remediate anonymous access
390390
href: anonymous-read-access-prevent.md
391-
- name: Remediate anonymous access (classic deployments)
392-
href: anonymous-read-access-prevent-classic.md
393391
- name: Configure anonymous access
394392
href: anonymous-read-access-configure.md
395393
- name: Microsoft Defender for Storage

articles/storage/blobs/anonymous-read-access-configure.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: how-to
9-
ms.date: 08/13/2024
9+
ms.date: 03/04/2025
1010
ms.reviewer: nachakra
1111
ms.devlang: powershell
1212
# ms.devlang: powershell, azurecli
@@ -20,10 +20,7 @@ Azure Storage supports optional anonymous read access for containers and blobs.
2020
> [!WARNING]
2121
> When a container is configured for anonymous access, any client can read data in that container. Anonymous access presents a potential security risk, so if your scenario does not require it, we recommend that you remediate anonymous access for the storage account.
2222
23-
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see one of these articles:
24-
25-
- [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
26-
- [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
23+
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
2724

2825
## About anonymous read access
2926

articles/storage/blobs/anonymous-read-access-overview.md

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: akashdubey-ms
66
ms.author: akashdubey
77
ms.service: azure-blob-storage
88
ms.topic: how-to
9-
ms.date: 09/12/2023
9+
ms.date: 03/04/2025
1010

1111
ms.reviewer: nachakra
1212
ms.custom: devx-track-arm-template
@@ -23,19 +23,9 @@ This article provides an overview of how to remediate anonymous access for your
2323
2424
## Recommendations for remediating anonymous access
2525

26-
To remediate anonymous access, first determine whether your storage account uses the Azure Resource Manager deployment model or the classic deployment model. For more information, see [Resource Manager and classic deployment](../../azure-resource-manager/management/deployment-models.md).
26+
You can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
2727

28-
### Azure Resource Manager accounts
29-
30-
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
31-
32-
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobAnonymousAccess** property to **False**. After you set the **AllowBlobAnonymousAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
33-
34-
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md).
35-
36-
### Classic accounts
37-
38-
If your storage account is using the classic deployment model, then you can remediate anonymous access by setting each container's access property to **Private**. To learn more about how to remediate anonymous access for classic storage accounts, see [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md).
28+
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
3929

4030
### Scenarios requiring anonymous access
4131

@@ -45,5 +35,4 @@ For information on how to configure containers for anonymous access, see [Config
4535

4636
## Next steps
4737

48-
- [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
49-
- [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
38+
- [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md)

articles/storage/blobs/anonymous-read-access-prevent-classic.md

Lines changed: 0 additions & 236 deletions
This file was deleted.

0 commit comments

Comments
 (0)