Skip to content

Commit 1bab5ab

Browse files
authored
Merge pull request #195108 from tamram/tamram22-0413
Azure AD conditional access requires disallowing Shared Key
2 parents 11f456b + f0ecf0d commit 1bab5ab

File tree

5 files changed

+22
-14
lines changed

5 files changed

+22
-14
lines changed

articles/storage/common/authorize-data-access.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,23 @@
11
---
2-
title: Authorize data operations
2+
title: Authorize operations for data access
33
titleSuffix: Azure Storage
44
description: Learn about the different ways to authorize access to data in Azure Storage. Azure Storage supports authorization with Azure Active Directory, Shared Key authorization, or shared access signatures (SAS), and also supports anonymous access to blobs.
55
services: storage
66
author: tamram
77

88
ms.service: storage
99
ms.topic: conceptual
10-
ms.date: 11/16/2021
10+
ms.date: 04/14/2022
1111
ms.author: tamram
12+
ms.reviewer: nachakra
1213
ms.subservice: common
1314
---
1415

1516
# Authorize access to data in Azure Storage
1617

17-
Each time you access data in your storage account, your client application makes a request over HTTP/HTTPS to Azure Storage. By default, every resource in Azure Storage is secured, and every request to a secure resource must be authorized. Authorization ensures that the client application has the appropriate permissions to access data in your storage account.
18+
Each time you access data in your storage account, your client application makes a request over HTTP/HTTPS to Azure Storage. By default, every resource in Azure Storage is secured, and every request to a secure resource must be authorized. Authorization ensures that the client application has the appropriate permissions to access a particular resource in your storage account.
19+
20+
## Understand authorization for data operations
1821

1922
The following table describes the options that Azure Storage offers for authorizing access to data:
2023

@@ -38,19 +41,20 @@ Each authorization option is briefly described below:
3841

3942
- **Shared Key authorization** for blobs, files, queues, and tables. A client using Shared Key passes a header with every request that is signed using the storage account access key. For more information, see [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/).
4043

41-
You can disallow Shared Key authorization for a storage account. When Shared Key authorization is disallowed, clients must use Azure AD to authorize requests for data in that storage account. For more information, see [Prevent Shared Key authorization for an Azure Storage account](shared-key-authorization-prevent.md).
44+
Microsoft recommends that you disallow Shared Key authorization for your storage account. When Shared Key authorization is disallowed, clients must use Azure AD or a user delegation SAS to authorize requests for data in that storage account. For more information, see [Prevent Shared Key authorization for an Azure Storage account](shared-key-authorization-prevent.md).
4245

43-
- **Shared access signatures** for blobs, files, queues, and tables. Shared access signatures (SAS) provide limited delegated access to resources in a storage account. Adding constraints on the time interval for which the signature is valid or on permissions it grants provides flexibility in managing access. For more information, see [Using shared access signatures (SAS)](storage-sas-overview.md).
46+
- **Shared access signatures** for blobs, files, queues, and tables. Shared access signatures (SAS) provide limited delegated access to resources in a storage account via a signed URL. The signed URL specifies the permissions granted to the resource and the interval over which the signature is valid. A service SAS or account SAS is signed with the account key, while the user delegation SAS is signed with Azure AD credentials and applies to blobs only. For more information, see [Using shared access signatures (SAS)](storage-sas-overview.md).
4447

4548
- **Anonymous public read access** for containers and blobs. When anonymous access is configured, then clients can read blob data without authorization. For more information, see [Manage anonymous read access to containers and blobs](../blobs/anonymous-read-access-configure.md).
4649

4750
You can disallow anonymous public read access for a storage account. When anonymous public read access is disallowed, then users cannot configure containers to enable anonymous access, and all requests must be authorized. For more information, see [Prevent anonymous public read access to containers and blobs](../blobs/anonymous-read-access-prevent.md).
48-
51+
4952
- **Storage Local Users** can be used to access blobs with SFTP or files with SMB. Storage Local Users support container level permissions for authorization. See [Connect to Azure Blob Storage by using the SSH File Transfer Protocol (SFTP)](../blobs/secure-file-transfer-protocol-support-how-to.md) for more information on how Storage Local Users can be used with SFTP.
5053

54+
[!INCLUDE [storage-account-key-note-include](../../../includes/storage-account-key-note-include.md)]
55+
5156
## Next steps
5257

5358
- Authorize access with Azure Active Directory to either [blob](../blobs/authorize-access-azure-active-directory.md), [queue](../queues/authorize-access-azure-active-directory.md), or [table](../tables/authorize-access-azure-active-directory.md) resources.
5459
- [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/)
5560
- [Grant limited access to Azure Storage resources using shared access signatures (SAS)](storage-sas-overview.md)
56-

articles/storage/common/shared-key-authorization-prevent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: storage
99
ms.topic: how-to
1010
ms.date: 04/01/2022
1111
ms.author: tamram
12-
ms.reviewer: fryu
12+
ms.reviewer: nachakra
1313
ms.custom: devx-track-azurepowershell, devx-track-azurecli
1414
ms.devlang: azurecli
1515
---

articles/storage/common/storage-account-keys-manage.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 01/25/2022
11-
ms.author: tamram
10+
ms.date: 04/14/2022
11+
ms.author: tamram
12+
ms.reviewer: nachakra
1213
ms.custom: devx-track-azurepowershell
1314
---
1415

@@ -287,3 +288,4 @@ To bring a storage account into compliance, rotate the account access keys.
287288

288289
- [Azure storage account overview](storage-account-overview.md)
289290
- [Create a storage account](storage-account-create.md)
291+
- [Prevent Shared Key authorization for an Azure Storage account](shared-key-authorization-prevent.md)

articles/storage/common/storage-configure-connection-string.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,9 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 10/14/2020
10+
ms.date: 04/14/2022
1111
ms.author: tamram
12-
ms.reviewer: ozgun
12+
ms.reviewer: nachakra
1313
ms.subservice: common
1414
---
1515

includes/storage-account-key-note-include.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: tamram
66
ms.service: storage
77
ms.topic: "include"
8-
ms.date: 12/09/2021
8+
ms.date: 04/14/2022
99
ms.author: tamram
1010
ms.custom: "include file"
1111
---
@@ -15,4 +15,6 @@ ms.custom: "include file"
1515
Your storage account access keys are similar to a root password for your storage account. Always be careful to protect your access keys. Use Azure Key Vault to manage and rotate your keys securely. Avoid distributing access keys to other users, hard-coding them, or saving them anywhere in plain text that is accessible to others. Rotate your keys if you believe they may have been compromised.
1616

1717
> [!NOTE]
18-
> Microsoft recommends using Azure Active Directory (Azure AD) to authorize requests against blob and queue data if possible, instead of Shared Key. Azure AD provides superior security and ease of use over Shared Key.
18+
> Microsoft recommends using Azure Active Directory (Azure AD) to authorize requests against blob and queue data if possible, rather than using the account keys (Shared Key authorization). Authorization with Azure AD provides superior security and ease of use over Shared Key authorization.
19+
>
20+
> To protect an Azure Storage account with Azure AD Conditional Access policies, you must disallow Shared Key authorization for the storage account. For more information about how to disallow Shared Key authorization, see [Prevent Shared Key authorization for an Azure Storage account](../articles/storage/common/shared-key-authorization-prevent.md).

0 commit comments

Comments
 (0)