You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-use-azcopy-authorize-azure-active-directory.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -174,9 +174,11 @@ Then, run any azcopy command (For example: `azcopy list https://contoso.blob.cor
174
174
175
175
## Authorize by using the AzCopy login command
176
176
177
-
As an alternative to using in-memory variables, you authorize access by using the azcopy login command. The azcopy login command retrieves an OAuth token and then places that token into a secret store on your system. If your operating system doesn't have a secret store such as a Linux keyring, the azcopy login command won't work because there is nowhere to place the token.
177
+
As an alternative to using in-memory variables, you authorize access by using the azcopy login command. However, this approach is not recommended as the azcopy login command will soon be deprecated.
178
178
179
-
> [!NOTE]
179
+
The azcopy login command retrieves an OAuth token and then places that token into a secret store on your system. If your operating system doesn't have a secret store such as a Linux keyring, the azcopy login command won't work because there is nowhere to place the token.
180
+
181
+
> [!IMPORTANT]
180
182
> The azcopy login command will soon be deprecated.
181
183
182
184
### Authorize a user identity (azcopy login command)
@@ -244,7 +246,7 @@ You can sign into your account by using a client secret or by using the password
244
246
245
247
To learn more about creating service principal, see [How to: Use the portal to create an Azure AD application and service principal that can access resources](../../active-directory/develop/howto-create-service-principal-portal.md).
246
248
247
-
#### Authorize a service principal by using a client secret
249
+
#### Authorize a service principal by using a client secret (azcopy login command)
248
250
249
251
Start by setting the `AZCOPY_SPA_CLIENT_SECRET` environment variable to the client secret of your service principal's app registration.
Replace the `<application-id>` placeholder with the application ID of your service principal's app registration. Replace the `<tenant-id>` placeholder with the tenant ID of the organization to which the storage account belongs. To find the tenant ID, select **Azure Active Directory > Properties > Directory ID** in the Azure portal.
270
272
271
-
#### Authorize a service principal by using a certificate
273
+
#### Authorize a service principal by using a certificate (azcopy login command)
272
274
273
275
If you prefer to use your own credentials for authorization, you can upload a certificate to your app registration, and then use that certificate to log in.
0 commit comments