Skip to content

Commit 6a7cda6

Browse files
authored
Merge pull request #92610 from Nickomang/master
Added private blob container info for storage accounts
2 parents 7f2f6e6 + dc78465 commit 6a7cda6

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

articles/service-fabric/service-fabric-concept-resource-model.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: athinanthny
66

77
ms.service: service-fabric
88
ms.topic: conceptual
9-
ms.date: 08/07/2019
9+
ms.date: 10/21/2019
1010
ms.author: atsenthi
1111
---
1212

@@ -37,8 +37,14 @@ Deploying an application from a Resource Manager template requires a storage acc
3737
![Create a storage account][CreateStorageAccount]
3838

3939
### Configure Storage account
40-
Once the storage account has been created, you need to create a blob container where the applications can be staged. In the Azure portal, navigate to the storage account that you would like to store your applications. Select the **Blobs** blade, and click the **Add Container** button. Add a new container with Blob Public access level.
41-
40+
Once the storage account has been created, you need to create a blob container where the applications can be staged. In the Azure portal, navigate to the storage account that you would like to store your applications. Select the **Blobs** blade, and click the **Add Container** button. Resources in your cluster can be secured by setting the public access level to private. Access can be granted in a number of ways:
41+
* [Authorize access to blobs and queues with Azure Active Directory](../storage/common/storage-auth-aad-app.md)
42+
* [Grant access to Azure blob and queue data with RBAC in the Azure portal](../storage/common/storage-auth-aad-rbac-portal.md)
43+
* [Delegate access with a shared access signature (SAS)](https://docs.microsoft.com/rest/api/storageservices/delegate-access-with-shared-access-signature
44+
)
45+
46+
For this example we will proceed using anonymous read access for blobs.
47+
4248
![Create blob][CreateBlob]
4349

4450
### Stage application in a Storage account

0 commit comments

Comments
 (0)