Skip to content

Commit ac73419

Browse files
committed
Editorial updates
1 parent 2285223 commit ac73419

File tree

1 file changed

+14
-4
lines changed

1 file changed

+14
-4
lines changed

articles/storage/blobs/blob-containers-portal.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,20 @@ Properly managing access to containers and their blobs is key to ensuring that y
8080

8181
### Manage Azure RBAC role assignments for the container
8282

83-
Azure role-based access control (Azure RBAC) is the authorization system you use to manage access to Azure resources. To grant access, you'll assign a role to a user, group, service principal, or managed identity. You may also choose to add one or more conditions to the role assignment.
83+
Azure Active Directory (Azure AD) offers optimum security for Blob Storage resources. Azure role-based access control (Azure RBAC) determines what permissions a security principal has to a given resource. To grant access to a container, you'll assign an RBAC role at the container scope or above to a user, group, service principal, or managed identity. You may also choose to add one or more conditions to the role assignment.
8484

8585
You can read about the assignment of roles at [Assign Azure roles using the Azure portal](assign-azure-role-data-access.md?tabs=portal).
8686

87+
### Use Shared Key authorization for data access
88+
89+
A request to Azure Storage can be authorized using either your Azure AD account or the storage account access key. You can use portal to determine which method you are using, and switch between the two if you have the appropriate permissions. Follow the steps within the [Determine the current authentication method](authorize-data-operations-portal.md#determine-the-current-authentication-method) section.
90+
91+
You may choose to use Azure AD authorization by default for data access when you create a storage account. You can accomplish this by following the steps within [Default to Azure AD authorization in the Azure portal](authorize-data-operations-portal.md#default-to-azure-ad-authorization-in-the-azure-portal).
92+
93+
Shared Key authentication does not associate an identity with the caller, therefore permission-based authorization cannot be performed. The caller can receive full access to all operations on all resources including data, setting owner, and access control lists (ACLs).
94+
95+
To minimize potential security vulnerabilities inherent in Shared Key, Azure AD authorization is recommended for use with your blobs when possible. For more information, read [Authorize access to blobs using Azure Active Directory](authorize-access-azure-active-directory.md). To disable Shared Key access, follow the steps within the [Prevent Shared Key authorization for an Azure Storage account](../common/shared-key-authorization-prevent.md?tabs=portal) article.
96+
8797
### Enable anonymous public read access
8898

8999
Although anonymous read access for containers is supported, it's disabled by default. All access requests must require authorization until anonymous access is explicitly enabled. After anonymous access is enabled, any client will be able to read data within that container without authorizing the request.
@@ -110,8 +120,8 @@ To generate an SAS token using the [Azure portal](https://portal.azure.com), fol
110120
:::image type="content" source="media/blob-containers-portal/select-container-sas-sml.png" alt-text="Screenshot showing how to access container shared access signature settings within the Azure portal" lightbox="media/blob-containers-portal/select-container-sas-lrg.png":::
111121

112122
1. Within the **Generate SAS** pane, select the **Account key** value for the **Signing method** field.
113-
1. In the **Signing method** field, select **Account key**.
114-
1. In the **Signing key** field, select the desired key to be used to sign the SAS.
123+
1. In the **Signing method** field, select **Account key**. Choosing the account key will result in the creation of a service SAS.
124+
1. In the **Signing key** field, select the desired key to be used to sign the SAS.
115125
1. In the **Stored access policy** field, select **None**.
116126
1. Select the **Permissions** field, then select the check boxes corresponding to the desired permissions.
117127
1. In the **Start and expiry date/time** section, specify the desired **Start** and **Expiry** date, time, and time zone values.
@@ -127,7 +137,7 @@ To generate an SAS token using the [Azure portal](https://portal.azure.com), fol
127137

128138
A **stored access policy** gives you additional server-side control over one or more shared access signatures. When you associate an SAS with a stored access policy, the SAS inherits the restrictions defined in the policy. These extra restrictions allow you to change the start time, expiry time, or permissions for a signature. You can also revoke it after it has been issued.
129139

130-
**Immutability policies** can be used to protect your data from overwrites and deletes. Immutability policies allow objects to be created and read, but prevents their modification or deletion for a specific duration. A **time-based retention policy** prohibits write and delete operations for a defined period of time. A **legal hold** also prohibits write and delete operations, but must be explicitly cleared before those operations can resume.
140+
**Immutability policies** can be used to protect your data from overwrites and deletes. Immutability policies allow objects to be created and read, but prevents their modification or deletion for a specific duration. Blob Storage supports two types of immutability policies. A **time-based retention policy** prohibits write and delete operations for a defined period of time. A **legal hold** also prohibits write and delete operations, but must be explicitly cleared before those operations can resume.
131141

132142
#### Create a stored access policy
133143

0 commit comments

Comments
 (0)