Skip to content

Commit 928127a

Browse files
Review feedback changes
1 parent 1f30842 commit 928127a

7 files changed

+7
-67
lines changed

articles/storage/blobs/anonymous-read-access-prevent.md

Lines changed: 0 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -382,56 +382,6 @@ end {
382382
}
383383
```
384384

385-
## Verify that anonymous access has been remediated
386-
387-
To verify that you've remediated anonymous access for a storage account, you can test that anonymous access to a blob isn't permitted, that modifying a container's access setting isn't permitted, and that it's not possible to create a container with anonymous access enabled.
388-
389-
### Verify that anonymous access to a blob isn't permitted
390-
391-
To verify that anonymous access to a specific blob is disallowed, you can attempt to download the blob via its URL. If the download succeeds, then the blob is still publicly available. If the blob isn't publicly accessible because anonymous access has been disallowed for the storage account, then you'll see an error message indicating that anonymous access isn't permitted on this storage account.
392-
393-
The following example shows how to use PowerShell to attempt to download a blob via its URL. Remember to replace the placeholder values in brackets with your own values:
394-
395-
```powershell
396-
$url = "<absolute-url-to-blob>"
397-
$downloadTo = "<file-path-for-download>"
398-
Invoke-WebRequest -Uri $url -OutFile $downloadTo -ErrorAction Stop
399-
```
400-
401-
### Verify that modifying the container's access setting isn't permitted
402-
403-
To verify that a container's access setting can't be modified after anonymous access is disallowed for the storage account, you can attempt to modify the setting. Changing the container's access setting fails if anonymous access is disallowed for the storage account.
404-
405-
The following example shows how to use PowerShell to attempt to change a container's access setting. Remember to replace the placeholder values in brackets with your own values:
406-
407-
```powershell
408-
$rgName = "<resource-group>"
409-
$accountName = "<storage-account>"
410-
$containerName = "<container-name>"
411-
412-
$storageAccount = Get-AzStorageAccount -ResourceGroupName $rgName -Name $accountName
413-
$ctx = $storageAccount.Context
414-
415-
Set-AzStorageContainerAcl -Context $ctx -Container $containerName -Permission Blob
416-
```
417-
418-
### Verify that a container can't be created with anonymous access enabled
419-
420-
If anonymous access is disallowed for the storage account, then you won't be able to create a new container with anonymous access enabled. To verify, you can attempt to create a container with anonymous access enabled.
421-
422-
The following example shows how to use PowerShell to attempt to create a container with anonymous access enabled. Remember to replace the placeholder values in brackets with your own values:
423-
424-
```powershell
425-
$rgName = "<resource-group>"
426-
$accountName = "<storage-account>"
427-
$containerName = "<container-name>"
428-
429-
$storageAccount = Get-AzStorageAccount -ResourceGroupName $rgName -Name $accountName
430-
$ctx = $storageAccount.Context
431-
432-
New-AzStorageContainer -Name $containerName -Permission Blob -Context $ctx
433-
```
434-
435385
### Check the anonymous access setting for multiple accounts
436386

437387
To check the anonymous access setting across a set of storage accounts with optimal performance, you can use the Azure Resource Graph Explorer in the Azure portal. To learn more about using the Resource Graph Explorer, see [Quickstart: Run your first Resource Graph query using Azure Resource Graph Explorer](../../governance/resource-graph/first-query-portal.md).

articles/storage/blobs/authorize-access-azure-active-directory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: conceptual
9-
ms.date: 03/17/2023
9+
ms.date: 05/10/2024
1010

1111
---
1212

articles/storage/common/authorize-data-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: pauljewellmsft
77
ms.author: pauljewell
88
ms.service: azure-storage
99
ms.topic: conceptual
10-
ms.date: 05/31/2023
10+
ms.date: 05/10/2024
1111
ms.reviewer: nachakra
1212
ms.subservice: storage-common-concepts
1313
---

articles/storage/common/shared-key-authorization-prevent.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -319,16 +319,6 @@ az storage account show \
319319

320320
The command returns **false** if Shared Key authorization is disallowed for the storage account.
321321

322-
You can further verify by attempting to call a data operation with the account access key. The following example attempts to create a container using the access key. This call will fail when Shared Key authorization is disallowed for the storage account. Replace the placeholder values in brackets with your own values:
323-
324-
```azurecli-interactive
325-
az storage container create \
326-
--account-name <storage-account-name> \
327-
--name sample-container \
328-
--account-key <key> \
329-
--auth-mode key
330-
```
331-
332322
> [!NOTE]
333323
> Anonymous requests are not authorized and will proceed if you have configured the storage account and container for anonymous read access. For more information, see [Configure anonymous read access for containers and blobs](../blobs/anonymous-read-access-configure.md).
334324

articles/storage/common/storage-account-keys-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: pauljewellmsft
77
ms.author: pauljewell
88
ms.service: azure-storage
99
ms.topic: how-to
10-
ms.date: 10/26/2023
10+
ms.date: 05/10/2024
1111
ms.reviewer: nachakra
1212
ms.custom: engagement-fy23, devx-track-azurecli
1313
---

articles/storage/common/storage-configure-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: pauljewell
88
ms.service: azure-storage
99
ms.subservice: storage-common-concepts
1010
ms.topic: how-to
11-
ms.date: 01/24/2023
11+
ms.date: 05/10/2024
1212
ms.reviewer: nachakra
1313
---
1414

includes/storage-dev-guides/storage-dev-guide-stored-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: pauljewellmsft
66
ms.service: azure-blob-storage
77
ms.topic: include
8-
ms.date: 05/22/2023
8+
ms.date: 05/10/2024
99
ms.author: pauljewell
1010
ms.custom: include file
1111
---
@@ -35,9 +35,9 @@ You can also modify an existing policy. The following code example shows how to
3535

3636
### Revoke or delete a stored access policy
3737

38-
To revoke a stored access policy, you can delete it, rename it by changing the signed identifier, or change the expiry time to a value in the past. Changing the signed identifier breaks the associations between any existing signatures and the stored access policy. Changing the expiry time to a value in the past causes any associated signatures to expire. Deleting or modifying the stored access policy immediately affects all of the shared access signatures associated with it.
38+
To revoke a stored access policy, Microsoft recommends deleting the signed identifier and making a new one. Changing the signed identifier breaks the associations between any existing signatures and the stored access policy. Deleting or modifying the stored access policy immediately affects all of the shared access signatures associated with it.
3939

40-
The following code example shows how to revoke a policy by changing the `Id` property for the signed identifier:
40+
The following code example shows how to revoke a policy by changing the `Id` property for the signed identifier. This approach effectively deletes the signed identifier and makes a new one:
4141

4242
:::code language="csharp" source="~/azure-storage-snippets/blobs/howto/dotnet/BlobDevGuideBlobs/CreateSas.cs" id="Snippet_RevokeStoredAccessPolicy":::
4343

0 commit comments

Comments
 (0)