You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/anonymous-read-access-configure.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
6
6
ms.author: pauljewell
7
7
ms.service: azure-blob-storage
8
8
ms.topic: how-to
9
-
ms.date: 08/13/2024
9
+
ms.date: 03/04/2025
10
10
ms.reviewer: nachakra
11
11
ms.devlang: powershell
12
12
# ms.devlang: powershell, azurecli
@@ -20,10 +20,7 @@ Azure Storage supports optional anonymous read access for containers and blobs.
20
20
> [!WARNING]
21
21
> When a container is configured for anonymous access, any client can read data in that container. Anonymous access presents a potential security risk, so if your scenario does not require it, we recommend that you remediate anonymous access for the storage account.
22
22
23
-
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see one of these articles:
24
-
25
-
-[Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
26
-
-[Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
23
+
This article describes how to configure anonymous read access for a container and its blobs. For information about how to remediate anonymous access for optimal security, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
Copy file name to clipboardExpand all lines: articles/storage/blobs/anonymous-read-access-overview.md
+4-15Lines changed: 4 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: akashdubey-ms
6
6
ms.author: akashdubey
7
7
ms.service: azure-blob-storage
8
8
ms.topic: how-to
9
-
ms.date: 09/12/2023
9
+
ms.date: 03/04/2025
10
10
11
11
ms.reviewer: nachakra
12
12
ms.custom: devx-track-arm-template
@@ -23,19 +23,9 @@ This article provides an overview of how to remediate anonymous access for your
23
23
24
24
## Recommendations for remediating anonymous access
25
25
26
-
To remediate anonymous access, first determine whether your storage account uses the Azure Resource Manager deployment model or the classic deployment model. For more information, see [Resource Manager and classic deployment](../../azure-resource-manager/management/deployment-models.md).
26
+
You can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
27
27
28
-
### Azure Resource Manager accounts
29
-
30
-
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobPublicAccess** property to **False**. After you set the **AllowBlobPublicAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
31
-
32
-
If your storage account is using the Azure Resource Manager deployment model, then you can remediate anonymous access for an account at any time by setting the account's **AllowBlobAnonymousAccess** property to **False**. After you set the **AllowBlobAnonymousAccess** property to **False**, all requests for blob data to that storage account will require authorization, regardless of the anonymous access setting for any individual container.
33
-
34
-
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md).
35
-
36
-
### Classic accounts
37
-
38
-
If your storage account is using the classic deployment model, then you can remediate anonymous access by setting each container's access property to **Private**. To learn more about how to remediate anonymous access for classic storage accounts, see [Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md).
28
+
To learn more about how to remediate anonymous access for Azure Resource Manager accounts, see [Remediate anonymous read access to blob data](anonymous-read-access-prevent.md).
39
29
40
30
### Scenarios requiring anonymous access
41
31
@@ -45,5 +35,4 @@ For information on how to configure containers for anonymous access, see [Config
45
35
46
36
## Next steps
47
37
48
-
-[Remediate anonymous read access to blob data (Azure Resource Manager deployments)](anonymous-read-access-prevent.md)
49
-
-[Remediate anonymous read access to blob data (classic deployments)](anonymous-read-access-prevent-classic.md)
38
+
-[Remediate anonymous read access to blob data](anonymous-read-access-prevent.md)
0 commit comments