Skip to content

Commit 614ec84

Browse files
Update auth guidance for ADLS
1 parent fa8d654 commit 614ec84

File tree

2 files changed

+10
-14
lines changed

2 files changed

+10
-14
lines changed

articles/storage/common/authorize-data-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ The following table provides information about supported authorization options f
3030
| --- | --- | --- |
3131
| Microsoft Entra ID | [Authorize access to Azure Storage data with Microsoft Entra ID](../blobs/authorize-access-azure-active-directory.md) | Microsoft recommends using Microsoft Entra ID with managed identities to authorize requests to blob resources. |
3232
| Shared Key (storage account key) | [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/) | Microsoft recommends that you [disallow Shared Key authorization](shared-key-authorization-prevent.md) for your storage accounts. |
33-
| Shared access signature (SAS) | [Using shared access signatures (SAS)](storage-sas-overview.md) | When SAS authorization is necessary, Microsoft recommends using user delegation SAS for limited delegated access to blob resources. |
33+
| Shared access signature (SAS) | [Using shared access signatures (SAS)](storage-sas-overview.md) | When SAS authorization is necessary, Microsoft recommends using user delegation SAS for limited delegated access to blob resources. SAS authorization is supported for Blob Storage and Data Lake Storage, and can be used for calls to `blob` endpoints and `dfs` endpoints. |
3434
| Anonymous read access | [Overview: Remediating anonymous read access for blob data](../blobs/anonymous-read-access-overview.md) | Microsoft recommends that you disable anonymous access for all of your storage accounts. |
3535
| Storage Local Users | Supported for SFTP only. To learn more see [Authorize access to Blob Storage for an SFTP client](../blobs/secure-file-transfer-protocol-support-how-to.md) | See guidance for options. |
3636

@@ -60,7 +60,7 @@ The following table provides information about supported authorization options f
6060

6161
| Authorization option | Guidance | Recommendation |
6262
| --- | --- | --- |
63-
| Microsoft Entra ID | [Authorize access to Azure Storage data with Microsoft Entra ID](../blobs/authorize-access-azure-active-directory.md) | Microsoft recommends using Microsoft Entra ID with managed identities to authorize requests to queue resources. |
63+
| Microsoft Entra ID | [Authorize access to Azure Storage data with Microsoft Entra ID](../queues/authorize-access-azure-active-directory.md) | Microsoft recommends using Microsoft Entra ID with managed identities to authorize requests to queue resources. |
6464
| Shared Key (storage account key) | [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/) | Microsoft recommends that you [disallow Shared Key authorization](shared-key-authorization-prevent.md) for your storage accounts. |
6565
| Shared access signature (SAS) | User delegation SAS isn't supported for Queue Storage. To learn more, see [Using shared access signatures (SAS)](storage-sas-overview.md). | Microsoft doesn't recommend using SAS tokens secured by the account key. |
6666

@@ -70,7 +70,7 @@ The following table provides information about supported authorization options f
7070

7171
| Authorization option | Guidance | Recommendation |
7272
| --- | --- | --- |
73-
| Microsoft Entra ID | [Authorize access to Azure Storage data with Microsoft Entra ID](../blobs/authorize-access-azure-active-directory.md) | Microsoft recommends using Microsoft Entra ID with managed identities to authorize requests to table resources. |
73+
| Microsoft Entra ID | [Authorize access to Azure Storage data with Microsoft Entra ID](../tables/authorize-access-azure-active-directory.md) | Microsoft recommends using Microsoft Entra ID with managed identities to authorize requests to table resources. |
7474
| Shared Key (storage account key) | [Authorize with Shared Key](/rest/api/storageservices/authorize-with-shared-key/) | Microsoft recommends that you [disallow Shared Key authorization](shared-key-authorization-prevent.md) for your storage accounts. |
7575
| Shared access signature (SAS) | User delegation SAS isn't supported for Table Storage. To learn more, see [Using shared access signatures (SAS)](storage-sas-overview.md). | Microsoft doesn't recommend using SAS tokens secured by the account key. |
7676

articles/storage/common/storage-sas-overview.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: pauljewellmsft
77
ms.author: pauljewell
88
ms.service: azure-storage
99
ms.topic: conceptual
10-
ms.date: 06/07/2023
10+
ms.date: 11/21/2024
1111
ms.reviewer: dineshm
1212
ms.subservice: storage-common-concepts
1313
---
@@ -17,33 +17,29 @@ ms.subservice: storage-common-concepts
1717
A shared access signature (SAS) provides secure delegated access to resources in your storage account. With a SAS, you have granular control over how a client can access your data. For example:
1818

1919
- What resources the client may access.
20-
2120
- What permissions they have to those resources.
22-
2321
- How long the SAS is valid.
2422

2523
## Types of shared access signatures
2624

2725
Azure Storage supports three types of shared access signatures:
2826

29-
- User delegation SAS
30-
31-
- Service SAS
32-
33-
- Account SAS
27+
- [User delegation SAS](#user-delegation-sas)
28+
- [Service SAS](#service-sas)
29+
- [Account SAS](#account-sas)
3430

3531
> [!IMPORTANT]
3632
> For scenarios where shared access signatures are used, Microsoft recommends using a user delegation SAS. A user delegation SAS is secured with Microsoft Entra credentials instead of the account key, which provides superior security. For more information on authorization for data access, see [Authorize access to data in Azure Storage](authorize-data-access.md).
3733
3834
### User delegation SAS
3935

40-
A user delegation SAS is secured with Microsoft Entra credentials and also by the permissions specified for the SAS. A user delegation SAS is supported for Azure Blob Storage and Azure Data Lake Storage. It's not currently supported for Azure Files, Azure Queue Storage, or Azure Table Storage.
36+
A user delegation SAS is secured with Microsoft Entra credentials and also by the permissions specified for the SAS. A user delegation SAS is supported for Blob Storage and Data Lake Storage. It's not currently supported for Queue Storage, Table Storage, or Azure Files.
4137

4238
For more information about the user delegation SAS, see [Create a user delegation SAS (REST API)](/rest/api/storageservices/create-user-delegation-sas).
4339

4440
### Service SAS
4541

46-
A service SAS is secured with the storage account key. A service SAS delegates access to a resource in only one of the Azure Storage services: Blob storage, Queue storage, Table storage, or Azure Files.
42+
A service SAS is secured with the storage account key. A service SAS delegates access to a resource in only one of the Azure Storage services: Blob storage, Data Lake Storage, Queue storage, Table storage, or Azure Files.
4743

4844
For more information about the service SAS, see [Create a service SAS (REST API)](/rest/api/storageservices/create-service-sas).
4945

@@ -95,7 +91,7 @@ The following table summarizes how each type of SAS token is authorized.
9591

9692
| Type of SAS | Type of authorization |
9793
|-|-|
98-
| User delegation SAS (Blob storage only) | Microsoft Entra ID |
94+
| User delegation SAS (Blob Storage and Data Lake Storage only) | Microsoft Entra ID |
9995
| Service SAS | Shared Key |
10096
| Account SAS | Shared Key |
10197

0 commit comments

Comments
 (0)