Skip to content

Commit a21a097

Browse files
authored
Update storage-auth-user-delegation-include.md
1 parent 2e563d1 commit a21a097

File tree

1 file changed

+2
-5
lines changed

1 file changed

+2
-5
lines changed

includes/storage-auth-user-delegation-include.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,20 +5,17 @@ services: storage
55
author: tamram
66
ms.service: storage
77
ms.topic: "include"
8-
ms.date: 07/25/2019
8+
ms.date: 01/15/2020
99
ms.author: tamram
1010
ms.custom: "include file"
1111
---
1212

13-
## About the user delegation SAS (preview)
13+
## About the user delegation SAS
1414

1515
A SAS token for access to a container or blob may be secured by using either Azure AD credentials or an account key. A SAS secured with Azure AD credentials is called a user delegation SAS, because the OAuth 2.0 token used to sign the SAS is requested on behalf of the user.
1616

1717
Microsoft recommends that you use Azure AD credentials when possible as a security best practice, rather than using the account key, which can be more easily compromised. When your application design requires shared access signatures, use Azure AD credentials to create a user delegation SAS for superior security. For more information about the user delegation SAS, see [Create a user delegation SAS](/rest/api/storageservices/create-user-delegation-sas).
1818

19-
> [!NOTE]
20-
> The user delegation SAS preview is intended for non-production use only.
21-
2219
> [!CAUTION]
2320
> Any client that possesses a valid SAS can access data in your storage account as permitted by that SAS. It's important to protect a SAS from malicious or unintended use. Use discretion in distributing a SAS, and have a plan in place for revoking a compromised SAS.
2421

0 commit comments

Comments
 (0)