Skip to content

Commit 7b5d509

Browse files
committed
add section on how to specify auth for blob upload
1 parent 65694b9 commit 7b5d509

File tree

3 files changed

+21
-8
lines changed

3 files changed

+21
-8
lines changed
31.1 KB
Loading

articles/storage/common/storage-access-blobs-queues-portal.md

Lines changed: 20 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: tamram
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 01/10/2020
10+
ms.date: 04/14/2020
1111
ms.author: tamram
1212
ms.reviewer: cbrooks
1313
ms.subservice: common
@@ -21,7 +21,7 @@ When you access blob or queue data using the [Azure portal](https://portal.azure
2121

2222
Depending on how you want to authorize access to blob or queue data in the Azure portal, you'll need specific permissions. In most cases, these permissions are provided via role-based access control (RBAC). For more information about RBAC, see [What is role-based access control (RBAC)?](../../role-based-access-control/overview.md).
2323

24-
### Account access key
24+
### Use the account access key
2525

2626
To access blob and queue data with the account access key, you must have an RBAC role assigned to you that includes the RBAC action **Microsoft.Storage/storageAccounts/listkeys/action**. This RBAC role may be a built-in or a custom role. Built-in roles that support **Microsoft.Storage/storageAccounts/listkeys/action** include:
2727

@@ -32,9 +32,9 @@ To access blob and queue data with the account access key, you must have an RBAC
3232
When you attempt to access blob or queue data in the Azure portal, the portal first checks whether you have been assigned a role with **Microsoft.Storage/storageAccounts/listkeys/action**. If you have been assigned a role with this action, then the portal uses the account key for accessing blob and queue data. If you have not been assigned a role with this action, then the portal attempts to access data using your Azure AD account.
3333

3434
> [!NOTE]
35-
> The classic subscription administrator roles Service Administrator and Co-Administrator include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action**, so a user with one of these administrative roles can also access blob and queue data with the account key. For more information, see [Classic subscription administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
35+
> The classic subscription administrator roles Service Administrator and Co-Administrator include the equivalent of the Azure Resource Manager [Owner](../../role-based-access-control/built-in-roles.md#owner) role. The **Owner** role includes all actions, including the **Microsoft.Storage/storageAccounts/listkeys/action**, so a user with one of these administrative roles can also access blob and queue data with the account key. For more information, see [Classic subscription administrator roles, Azure RBAC roles, and Azure AD administrator roles](../../role-based-access-control/rbac-and-directory-admin-roles.md#classic-subscription-administrator-roles).
3636
37-
### Azure AD account
37+
### Use your Azure AD account
3838

3939
To access blob or queue data from the Azure portal using your Azure AD account, both of the following statements must be true for you:
4040

@@ -50,7 +50,7 @@ The built-in roles that support access to your blob or queue data include:
5050
- [Storage Blob Data Reader](../../role-based-access-control/built-in-roles.md#storage-blob-data-reader): Read-only permissions for blobs.
5151
- [Storage Queue Data Contributor](../../role-based-access-control/built-in-roles.md#storage-queue-data-contributor): Read/write/delete permissions for queues.
5252
- [Storage Queue Data Reader](../../role-based-access-control/built-in-roles.md#storage-queue-data-reader): Read-only permissions for queues.
53-
53+
5454
Custom roles can support different combinations of the same permissions provided by the built-in roles. For more information about creating custom RBAC roles, see [Custom roles for Azure resources](../../role-based-access-control/custom-roles.md) and [Understand role definitions for Azure resources](../../role-based-access-control/role-definitions.md).
5555

5656
Listing queues with a classic subscription administrator role is not supported. To list queues, a user must have assigned to them the Azure Resource Manager **Reader** role, the **Storage Queue Data Reader** role, or the **Storage Queue Data Contributor** role.
@@ -70,7 +70,7 @@ When you navigate to a container or a queue, the Azure portal indicates whether
7070

7171
The examples in this section show accessing a container and its blobs, but the portal displays the same message when you are accessing a queue and its messages, or listing queues.
7272

73-
### Account access key
73+
### Authenticate with the account access key
7474

7575
If you are authenticating using the account access key, you'll see **Access Key** specified as the authentication method in the portal:
7676

@@ -82,7 +82,7 @@ To switch to using Azure AD account, click the link highlighted in the image. If
8282

8383
Notice that no blobs appear in the list if your Azure AD account lacks permissions to view them. Click on the **Switch to access key** link to use the access key for authentication again.
8484

85-
### Azure AD account
85+
### Authenticate with your Azure AD account
8686

8787
If you are authenticating using your Azure AD account, you'll see **Azure AD User Account** specified as the authentication method in the portal:
8888

@@ -94,6 +94,19 @@ To switch to using the account access key, click the link highlighted in the ima
9494

9595
Notice that no blobs appear in the list if you do not have access to the account keys. Click on the **Switch to Azure AD User Account** link to use your Azure AD account for authentication again.
9696

97+
## Specify how to authorize a blob upload operation
98+
99+
When you upload a blob from the Azure portal, you can specify whether to authenticate and authorize that operation with the account access key or with your Azure AD credentials. By default, the portal uses the current authentication method, as shown in [Determine the current authentication method](#determine-the-current-authentication-method).
100+
101+
To specify how to authorize a blob upload operation, follow these steps:
102+
103+
1. In the Azure portal, navigate to the container where you wish to upload a blob.
104+
1. Select the **Upload** button.
105+
1. Expand the **Advanced** section to display the advanced properties for the blob.
106+
1. In the **Authentication Type** field, indicate whether you want to authorize the upload operation by using your Azure AD account or with the account access key, as shown in the following image:
107+
108+
:::image type="content" source="media/storage-access-blobs-queues-portal/auth-blob-upload.png" alt-text="Screenshot showing how to change authorization method on blob upload":::
109+
97110
## Next steps
98111

99112
- [Authenticate access to Azure blobs and queues using Azure Active Directory](storage-auth-aad.md)

articles/storage/common/storage-redundancy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ A write operation is first committed to the primary location and replicated usin
9696

9797
Geo-zone-redundant storage (GZRS) (preview) combines the high availability provided by redundancy across availability zones with protection from regional outages provided by geo-replication. Data in a GZRS storage account is copied across three [Azure availability zones](../../availability-zones/az-overview.md) in the primary region and is also replicated to a secondary geographic region for protection from regional disasters. Microsoft recommends using GZRS for applications requiring maximum consistency, durability, and availability, excellent performance, and resilience for disaster recovery.
9898

99-
With a GZRS storage account, you can continue to read and write data if an availability zone becomes unavailable or is unrecoverable. Additionally, your data is also durable in the case of a complete regional outage or a disaster in which the primary region isnt recoverable. GZRS is designed to provide at least 99.99999999999999% (16 9's) durability of objects over a given year.
99+
With a GZRS storage account, you can continue to read and write data if an availability zone becomes unavailable or is unrecoverable. Additionally, your data is also durable in the case of a complete regional outage or a disaster in which the primary region isn't recoverable. GZRS is designed to provide at least 99.99999999999999% (16 9's) durability of objects over a given year.
100100

101101
Only general-purpose v2 storage accounts support GZRS and RA-GZRS. For more information about storage account types, see [Azure storage account overview](storage-account-overview.md). GZRS and RA-GZRS support block blobs, page blobs (except for VHD disks), files, tables, and queues.
102102

0 commit comments

Comments
 (0)