You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/blobs/blob-containers-portal.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ To create a container in the [Azure portal](https://portal.azure.com), follow th
32
32
33
33
1. In the portal navigation pane on the left side of the screen, select **Storage accounts** and choose a storage account. If the navigation pane isn't visible, select the menu button to toggle its visibility.
34
34
35
-
:::image type="content" source="media/blob-containers-portal/menu-expand-sml.png" alt-text="Screenshot of the Azure Portal homepage showing the location of the Menu button in the browser." lightbox="media/blob-containers-portal/menu-expand-lrg.png":::
35
+
:::image type="content" source="media/blob-containers-portal/menu-expand-sml.png" alt-text="Screenshot of the Azure portal homepage showing the location of the Menu button in the browser." lightbox="media/blob-containers-portal/menu-expand-lrg.png":::
36
36
37
37
1. In the navigation pane for the storage account, scroll to the **Data storage** section and select **Containers**.
38
38
1. Within the **Containers** pane, select the **+ Container** button to open the **New container** pane.
@@ -107,7 +107,7 @@ To generate an SAS token using the [Azure portal](https://portal.azure.com), fol
107
107
1. Select the checkbox next to the name of the container for which you'll generate an SAS token.
108
108
1. Select the container's **More** button (**...**), and select **Generate SAS** to display the **Generate SAS** pane.
109
109
110
-
:::image type="content" source="media/blob-containers-portal/select-container-sas-sml.png" alt-text="Screenshot showing how to access container shared access signature settings within the Azure portal" lightbox="media/blob-containers-portal/select-container-sas-lrg.png":::
110
+
:::image type="content" source="media/blob-containers-portal/select-container-sas-sml.png" alt-text="Screenshot showing how to access container shared access signature settings in the Azure portal." lightbox="media/blob-containers-portal/select-container-sas-lrg.png":::
111
111
112
112
1. Within the **Generate SAS** pane, select the **Account key** value for the **Signing method** field.
113
113
1. In the **Signing method** field, select **Account key**. Choosing the account key will result in the creation of a service SAS.
@@ -137,11 +137,11 @@ Configuring a stored access policy is a two-step process: the policy must first
137
137
1. Select the checkbox next to the name of the container for which you'll generate an SAS token.
138
138
1. Select the container's **More** button (**...**), and select **Access policy** to display the **Access policy** pane.
139
139
140
-
:::image type="content" source="media/blob-containers-portal/select-container-policy-sml.png" alt-text="Screenshot showing how to access container stored access policy settings within the Azure portal." lightbox="media/blob-containers-portal/select-container-policy-lrg.png":::
140
+
:::image type="content" source="media/blob-containers-portal/select-container-policy-sml.png" alt-text="Screenshot showing how to access container stored access policy settings in the Azure portal." lightbox="media/blob-containers-portal/select-container-policy-lrg.png":::
141
141
142
142
1. Within the **Access policy** pane, select **+ Add policy** in the **Stored access policies** section to display the **Add policy** pane. Any existing policies will be displayed in either the appropriate section.
143
143
144
-
:::image type="content" source="media/blob-containers-portal/select-add-policy-sml.png" alt-text="Screenshot showing how to add a stored access policy settings within the Azure portal." lightbox="media/blob-containers-portal/select-add-policy-lrg.png":::
144
+
:::image type="content" source="media/blob-containers-portal/select-add-policy-sml.png" alt-text="Screenshot showing how to add a stored access policy in the Azure portal." lightbox="media/blob-containers-portal/select-add-policy-lrg.png":::
145
145
146
146
1. Within the **Add policy** pane, select the **Identifier** box and add a name for your new policy.
147
147
1. Select the **Permissions** field, then select the check boxes corresponding to the permissions desired for your new policy.
@@ -151,7 +151,7 @@ Configuring a stored access policy is a two-step process: the policy must first
151
151
> [!CAUTION]
152
152
> Although your policy is now displayed in the **Stored access policy** table, it is still not applied to the container. If you navigate away from the **Access policy** pane at this point, the policy will *not* be saved or applied and you will lose your work.
153
153
154
-
:::image type="content" source="media/blob-containers-portal/select-save-policy-sml.png" alt-text="Screenshot showing how to define a stored access policy within the Azure portal." lightbox="media/blob-containers-portal/select-save-policy-lrg.png":::
154
+
:::image type="content" source="media/blob-containers-portal/select-save-policy-sml.png" alt-text="Screenshot showing how to create a stored access policy within the Azure portal." lightbox="media/blob-containers-portal/select-save-policy-lrg.png":::
155
155
156
156
1. In the **Access policy** pane, select **+ Add policy** to define another policy, or select **Save** to apply your new policy to the container. After creating at least one stored access policy, you'll be able to associate other secure access signatures (SAS) with it.
157
157
@@ -183,7 +183,7 @@ To acquire a lease using the Azure portal, follow these steps:
183
183
1. Select the checkbox next to the name of the container for which you'll acquire a lease.
184
184
1. Select the container's **More** button (**...**), and select **Acquire lease** to request a new lease and display the details in the **Lease status** pane.
185
185
186
-
:::image type="content" source="media/blob-containers-portal/acquire-container-lease-sml.png" alt-text="Screenshot showing how to access container lease settings within the Azure portal." lightbox="media/blob-containers-portal/acquire-container-lease-lrg.png":::
186
+
:::image type="content" source="media/blob-containers-portal/acquire-container-lease-sml.png" alt-text="Screenshot showing how to access container lease settings in the Azure portal." lightbox="media/blob-containers-portal/acquire-container-lease-lrg.png":::
187
187
188
188
1. The **Container** and **Lease ID** property values of the newly requested lease are displayed within the **Lease status** pane. Copy and paste these values in a secure location. They'll only be displayed once and can't be retrieved after the pane is closed.
189
189
@@ -247,4 +247,4 @@ You can restore a soft-deleted container and its contents within the retention p
247
247
-[Create a storage account](../common/storage-account-create.md?tabs=azure-portal&toc=%2fazure%2fstorage%2fblobs%2ftoc.json)
248
248
-[Manage blob containers using PowerShell](blob-containers-powershell.md)
Copy file name to clipboardExpand all lines: articles/storage/common/sas-expiration-policy.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,19 @@
1
1
---
2
-
title: Create an expiration policy for shared access signatures
2
+
title: Configure an expiration policy for shared access signatures (SAS)
3
3
titleSuffix: Azure Storage
4
-
description: Create a policy on the storage account that defines the length of time that a shared access signature (SAS) should be valid. Learn how to monitor policy violations to remediate security risks.
4
+
description: Configure a policy on the storage account that defines the length of time that a shared access signature (SAS) should be valid. Learn how to monitor policy violations to remediate security risks.
5
5
services: storage
6
6
author: jimmart-dev
7
7
8
8
ms.service: storage
9
9
ms.topic: how-to
10
-
ms.date: 04/18/2022
10
+
ms.date: 10/25/2022
11
11
ms.author: jammart
12
12
ms.reviewer: nachakra
13
13
ms.subservice: common
14
14
---
15
15
16
-
# Create an expiration policy for shared access signatures
16
+
# Configure an expiration policy for shared access signatures
17
17
18
18
You can use a shared access signature (SAS) to delegate access to resources in your Azure Storage account. A SAS token includes the targeted resource, the permissions granted, and the interval over which access is permitted. Best practices recommend that you limit the interval for a SAS in case it is compromised. By setting a SAS expiration policy for your storage accounts, you can provide a recommended upper expiration limit when a user creates a service SAS or an account SAS.
19
19
@@ -31,16 +31,16 @@ A SAS expiration policy does not prevent a user from creating a SAS with an expi
31
31
32
32
When a SAS expiration policy is in effect for the storage account, the signed start field is required for every SAS. If the signed start field is not included on the SAS, and you have configured a diagnostic setting for logging with Azure Monitor, then Azure Storage writes a message to the **SasExpiryStatus** property in the logs whenever a user creates or uses a SAS without a value for the signed start field.
33
33
34
-
## Create a SAS expiration policy
34
+
## Configure a SAS expiration policy
35
35
36
-
When you create a SAS expiration policy on a storage account, the policy applies to each type of SAS that is signed with the account key. The types of shared access signatures that are signed with the account key are the service SAS and the account SAS.
36
+
When you configure a SAS expiration policy on a storage account, the policy applies to each type of SAS that is signed with the account key. The types of shared access signatures that are signed with the account key are the service SAS and the account SAS.
37
37
38
38
> [!NOTE]
39
-
> Before you can create a SAS expiration policy, you may need to rotate each of your account access keys at least once.
39
+
> Before you can configure a SAS expiration policy, you may need to rotate each of your account access keys at least once.
40
40
41
41
### [Azure portal](#tab/azure-portal)
42
42
43
-
To create a SAS expiration policy in the Azure portal, follow these steps:
43
+
To configure a SAS expiration policy in the Azure portal, follow these steps:
44
44
45
45
1. Navigate to your storage account in the Azure portal.
46
46
1. Under **Settings**, select **Configuration**.
@@ -53,7 +53,7 @@ To create a SAS expiration policy in the Azure portal, follow these steps:
53
53
54
54
### [PowerShell](#tab/azure-powershell)
55
55
56
-
To create a SAS expiration policy, use the [Set-AzStorageAccount](/powershell/module/az.storage/set-azstorageaccount) command, and then set the `-SasExpirationPeriod` parameter to the number of days, hours, minutes, and seconds that a SAS token can be active from the time that a SAS is signed. The string that you provide the `-SasExpirationPeriod` parameter uses the following format: `<days>.<hours>:<minutes>:<seconds>`. For example, if you wanted the SAS to expire 1 day, 12 hours, 5 minutes, and 6 seconds after it is signed, then you would use the string `1.12:05:06`.
56
+
To configure a SAS expiration policy, use the [Set-AzStorageAccount](/powershell/module/az.storage/set-azstorageaccount) command, and then set the `-SasExpirationPeriod` parameter to the number of days, hours, minutes, and seconds that a SAS token can be active from the time that a SAS is signed. The string that you provide the `-SasExpirationPeriod` parameter uses the following format: `<days>.<hours>:<minutes>:<seconds>`. For example, if you wanted the SAS to expire 1 day, 12 hours, 5 minutes, and 6 seconds after it is signed, then you would use the string `1.12:05:06`.
@@ -77,7 +77,7 @@ The SAS expiration period appears in the console output.
77
77
78
78
### [Azure CLI](#tab/azure-cli)
79
79
80
-
To create a SAS expiration policy, use the [az storage account update](/cli/azure/storage/account#az-storage-account-update) command, and then set the `--key-exp-days` parameter to the number of days, hours, minutes, and seconds that a SAS token can be active from the time that a SAS is signed. The string that you provide the `--key-exp-days` parameter uses the following format: `<days>.<hours>:<minutes>:<seconds>`. For example, if you wanted the SAS to expire 1 day, 12 hours, 5 minutes, and 6 seconds after it is signed, then you would use the string `1.12:05:06`.
80
+
To configure a SAS expiration policy, use the [az storage account update](/cli/azure/storage/account#az-storage-account-update) command, and then set the `--key-exp-days` parameter to the number of days, hours, minutes, and seconds that a SAS token can be active from the time that a SAS is signed. The string that you provide the `--key-exp-days` parameter uses the following format: `<days>.<hours>:<minutes>:<seconds>`. For example, if you wanted the SAS to expire 1 day, 12 hours, 5 minutes, and 6 seconds after it is signed, then you would use the string `1.12:05:06`.
81
81
82
82
```azurecli-interactive
83
83
az storage account update \
@@ -153,7 +153,7 @@ To monitor your storage accounts for compliance with the key expiration policy,
153
153
154
154
:::image type="content" source="media/sas-expiration-policy/policy-compliance-report-portal-inline.png" alt-text="Screenshot showing how to view the compliance report for the SAS expiration built-in policy" lightbox="media/sas-expiration-policy/policy-compliance-report-portal-expanded.png":::
155
155
156
-
To bring a storage account into compliance, configure a SAS expiration policy for that account, as described in [Create a SAS expiration policy](#create-a-sas-expiration-policy).
156
+
To bring a storage account into compliance, configure a SAS expiration policy for that account, as described in [Configure a SAS expiration policy](#configure-a-sas-expiration-policy).
Copy file name to clipboardExpand all lines: articles/storage/common/storage-sas-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -160,7 +160,7 @@ The following recommendations for using shared access signatures can help mitiga
160
160
161
161
-**Configure a SAS expiration policy for the storage account.** A SAS expiration policy specifies a recommended interval over which the SAS is valid. SAS expiration policies apply to a service SAS or an account SAS. When a user generates service SAS or an account SAS with a validity interval that is larger than the recommended interval, they'll see a warning. If Azure Storage logging with Azure Monitor is enabled, then an entry is written to the Azure Storage logs. To learn more, see [Create an expiration policy for shared access signatures](sas-expiration-policy.md).
162
162
163
-
-**Define a stored access policy for a service SAS.** Stored access policies give you the option to revoke permissions for a service SAS without having to regenerate the storage account keys. Set the expiration on these very far in the future (or infinite) and make sure it's regularly updated to move it farther into the future. There is a limit of five stored access policies per container.
163
+
-**Create a stored access policy for a service SAS.** Stored access policies give you the option to revoke permissions for a service SAS without having to regenerate the storage account keys. Set the expiration on these very far in the future (or infinite) and make sure it's regularly updated to move it farther into the future. There is a limit of five stored access policies per container.
164
164
165
165
-**Use near-term expiration times on an ad hoc SAS service SAS or account SAS.** In this way, even if a SAS is compromised, it's valid only for a short time. This practice is especially important if you cannot reference a stored access policy. Near-term expiration times also limit the amount of data that can be written to a blob by limiting the time available to upload to it.
0 commit comments