You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/governance/machine-configuration/how-to/develop-custom-package/5-access-package.md
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,19 @@
1
+
---
2
+
title: How to publish custom machine configuration package artifacts
3
+
description: Learn how to provide access to a machine configuration package file in Azure blob storage .
4
+
ms.date: 08/28/2024
5
+
ms.topic: how-to
6
+
ms.custom: devx-track-azurepowershell
7
+
---
1
8
2
9
# How to provide secure access to custom machine configuration packages
3
10
This page provides a guide on how to provide access to Machine Configuration packages stored in Azure storage by using the resource ID of a user-assigned managed identity or a Shared Access Signature (SAS) token.
4
-
# Prerequisites
11
+
##Prerequisites
5
12
- Azure subscription
6
13
- Azure Storage account with the Machine Configuration package
This setup ensures that your Azure VMs can securely read from the specified blob container using the user-assigned managed identity.
47
54
48
-
## Using a SAS Token
55
+
###Using a SAS Token
49
56
While this next step is optional, you should add a shared access signature (SAS) token in the URL to ensure secure access to the package. The below example generates a blob SAS token with read access and returns the full blob URI with the shared access signature token. In this example, the token has a time limit of three years.
By using the resource ID of a user-assigned managed identity or SAS token, you can securely provide access to Machine Configuration packages stored in Azure storage. The additional parameters and flags ensure that the package is retrieved using the managed identity and that Azure Arc machines are not included in the policy scope.
69
76
70
-
# Next Steps
77
+
##Next Steps
71
78
- After creating the policy definition, you can assign it to the appropriate scope (e.g., management group, subscription, resource group) within your Azure environment.
72
79
- Remember to monitor the policy compliance status and make any necessary adjustments to your Machine Configuration package or policy assignment to meet your organizational requirements.
0 commit comments