Skip to content

Commit 7170d0b

Browse files
committed
final minor edits
1 parent 8d2766c commit 7170d0b

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

articles/storage/common/shared-key-authorization-prevent.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: jimmart-dev
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 11/11/2022
10+
ms.date: 11/14/2022
1111
ms.author: jammart
1212
ms.reviewer: nachakra
1313
ms.custom: devx-track-azurepowershell, devx-track-azurecli, engagement-fy23
@@ -76,16 +76,16 @@ To protect an Azure Storage account with Azure AD [Conditional Access](../../act
7676

7777
Azure Storage supports Azure AD authorization for requests to blob, table and queue storage only. If you disallow authorization with Shared Key for a storage account, requests to Azure Files that use Shared Key authorization will fail. Because the Azure portal always uses Shared Key authorization to access file data, if you disallow authorization with Shared Key for the storage account, you will not be able to access Azure Files data in the Azure portal.
7878

79-
Microsoft recommends that you either migrate any Azure Files data to a separate storage account before you disallow access to the account via Shared Key, or that you do not apply this setting to storage accounts that support Azure Files workloads.
79+
Microsoft recommends that you either migrate any Azure Files data to a separate storage account before you disallow access to an account via Shared Key, or do not apply this setting to storage accounts that support Azure Files workloads.
8080

8181
Disallowing Shared Key access for a storage account does not affect SMB connections to Azure Files.
8282

8383
## Identify storage accounts that allow Shared Key access
8484

8585
There are two ways to identify storage accounts that allow Shared Key access:
8686

87-
1. [Check the Shared Key access setting for multiple accounts](#check-the-shared-key-access-setting-for-multiple-accounts)
88-
1. [Configure the Azure Policy for Shared Key access in audit mode](#configure-the-azure-policy-for-shared-key-access-in-audit-mode)
87+
- [Check the Shared Key access setting for multiple accounts](#check-the-shared-key-access-setting-for-multiple-accounts)
88+
- [Configure the Azure Policy for Shared Key access in audit mode](#configure-the-azure-policy-for-shared-key-access-in-audit-mode)
8989

9090
### Check the Shared Key access setting for multiple accounts
9191

@@ -102,7 +102,7 @@ resources
102102

103103
### Configure the Azure Policy for Shared Key access in audit mode
104104

105-
Azure Policy **Storage accounts should prevent shared key access** prevents users with appropriate permissions from configuring new or existing storage accounts to permit Shared Key authorization. Configure this policy in audit mode to identify storage accounts where Shared Key authorization is allowed. After you have changed applications to use Azure AD rather than Shared Key for authorization, you can [change the policy to prevent allowing Shared Key access](#update-the-azure-policy-to-prevent-allowing-shared-key-access).
105+
Azure Policy **Storage accounts should prevent shared key access** prevents users with appropriate permissions from configuring new or existing storage accounts to permit Shared Key authorization. Configure this policy in audit mode to identify storage accounts where Shared Key authorization is allowed. After you have changed applications to use Azure AD rather than Shared Key for authorization, you can [update the policy to prevent allowing Shared Key access](#update-the-azure-policy-to-prevent-allowing-shared-key-access).
106106

107107
For more information about the built-in policy, see **Storage accounts should prevent shared key access** in [List of built-in policy definitions](../../governance/policy/samples/built-in-policies.md#storage).
108108

@@ -113,8 +113,8 @@ Follow these steps to assign the built-in policy for the appropriate scope in th
113113
1. In the Azure portal, search for *Policy* to display the Azure Policy dashboard.
114114
1. In the **Authoring** section, select **Assignments**.
115115
1. Choose **Assign policy**.
116-
1. On the **Basics** tab of the **Assign policy** page, in the **Scope** section, specify the scope for the policy assignment. Select the **More** button to choose the subscription and optional resource group.
117-
1. For the **Policy definition** field, select the **More** button, and enter *shared key access* in the **Search** field. Select the policy definition named **Storage accounts should prevent shared key access**.
116+
1. On the **Basics** tab of the **Assign policy** page, in the **Scope** section, specify the scope for the policy assignment. Select the **More** button (**...**) to choose the subscription and optional resource group.
117+
1. For the **Policy definition** field, select the **More** button (**...**), and enter *shared key access* in the **Search** field. Select the policy definition named **Storage accounts should prevent shared key access**.
118118

119119
:::image type="content" source="media/shared-key-authorization-prevent/policy-definition-select-portal.png" alt-text="Screenshot showing how to select the built-in policy to prevent allowing Shared Key access for your storage accounts" lightbox="media/shared-key-authorization-prevent/policy-definition-select-portal.png":::
120120

@@ -126,7 +126,8 @@ Follow these steps to assign the built-in policy for the appropriate scope in th
126126

127127
To monitor your storage accounts for compliance with the Shared Key access policy, follow these steps:
128128

129-
1. On the Azure Policy dashboard, locate and select the policy assignment you created in the previous section.
129+
1. On the Azure Policy dashboard under **Authoring**, select **Assignments**.
130+
1. Locate and select the policy assignment you created in the previous section.
130131
1. Select the **View compliance** tab.
131132
1. Any storage accounts within the scope of the policy assignment that do not meet the policy requirements appear in the compliance report.
132133

@@ -287,7 +288,7 @@ az storage account update \
287288

288289
---
289290

290-
After you disallow Shared Key authorization, making a request to the storage account with Shared Key authorization will fail with error code 403 (Forbidden). Azure Storage returns error indicating that key-based authorization is not permitted on the storage account.
291+
After you disallow Shared Key authorization, making a request to the storage account with Shared Key authorization will fail with error code 403 (Forbidden). Azure Storage an returns error indicating that key-based authorization is not permitted on the storage account.
291292

292293
The **AllowSharedKeyAccess** property is supported for storage accounts that use the Azure Resource Manager deployment model only. For information about which storage accounts use the Azure Resource Manager deployment model, see [Types of storage accounts](storage-account-overview.md#types-of-storage-accounts).
293294

@@ -308,18 +309,18 @@ az storage container create \
308309
309310
## Monitor the Azure Policy for compliance
310311

311-
Continue to [monitor the policy you created earlier](#monitor-compliance-with-the-policy) for ongoing compliance.
312+
After disallowing Shared Key access on the desired storage accounts, continue to [monitor the policy you created earlier](#monitor-compliance-with-the-policy) for ongoing compliance. Based on the monitoring results, take the appropriate action as needed, including changing the scope of the policy, disallowing Shared Key access on more accounts or allowing it for accounts where need more time is needed for remediation.
312313

313314
## Update the Azure Policy to prevent allowing Shared Key access
314315

315-
To begin enforcing [the Azure Policy assignment you previously created](#configure-the-azure-policy-for-shared-key-access-in-audit-mode) for policy **Storage accounts should prevent shared key access**, change the effect of the policy assignment to deny to allow Shared Key access on storage accounts. To change the effect of the policy, perform the following steps:
316+
To begin enforcing [the Azure Policy assignment you previously created](#configure-the-azure-policy-for-shared-key-access-in-audit-mode) for policy **Storage accounts should prevent shared key access**, change the **Effect** of the policy assignment to **Deny** to prevent authorized users from allowing Shared Key access on storage accounts. To change the effect of the policy, perform the following steps:
316317

317318
1. On the Azure Policy dashboard, locate and select the policy assignment [you previously created](#configure-the-azure-policy-for-shared-key-access-in-audit-mode).
318319

319320
1. Select **Edit assignment**.
320321
1. Go to the **Parameters** tab.
321322
1. Uncheck the **Only show parameters that need input or review** checkbox.
322-
1. In the **Effect** drop-down change `Audit` to `Deny`, then select **Review + save**.
323+
1. In the **Effect** drop-down change **Audit** to **Deny**, then select **Review + save**.
323324
1. On the **Review + save** tab, review your changes, then select **Save**.
324325

325326
> [!NOTE]

0 commit comments

Comments
 (0)