Skip to content

Commit acf74ab

Browse files
authored
Merge pull request #228453 from fvneerden/patch-37
Add Storage Behind Firewall how-to
2 parents d8de769 + d25abb4 commit acf74ab

8 files changed

+56
-0
lines changed
7.52 KB
Loading
Loading
Loading
Loading
127 KB
Loading
74.6 KB
Loading
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
---
2+
title: Use Video Indexer with storage behind firewall
3+
description: This article gives an overview how to configure Azure Video Indexer to use storage behind firewall.
4+
ms.topic: article
5+
ms.date: 03/02/2023
6+
ms.author: juliako
7+
---
8+
9+
# Configure Video Indexer to work with storage accounts behind firewall
10+
11+
When you create a Video Indexer account, you must associate it with a Media Services and Storage account. Video Indexer can access Media Services and Storage using system authentication or Managed Identity authentication. Video Indexer validates that the user adding the association has access to the Media Services and Storage account with Azure Resource Manager Role Based Access Control (RBAC).
12+
13+
If you want to use a firewall to secure your storage account and enable trusted storage, [Managed Identities](/azure/media-services/latest/concept-managed-identities) authentication that allows Video Indexer access through the firewall is the preferred option. It allows Video Indexer and Media Services to access the storage account that has been configured without needing public access for [trusted storage access.](/azure/storage/common/storage-network-security?tabs=azure-portal#grant-access-to-trusted-azure-services)
14+
15+
Follow these steps to enable Managed Identity for Media Services and Storage and then lock your storage account. It's assumed that you already created a Video Indexer account and associated with a Media Services and Storage account.
16+
17+
## Assign the Managed Identity and role
18+
19+
1. When you navigate to your Video Indexer account for the first time, we validate if you have the correct role assignments for Media Services and Storage. If not, the following banners that allow you to assign the correct role automatically will appear. If you don’t see the banner for the Storage account, it means your Storage account isn't behind a firewall, or everything is already set.
20+
21+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-assign-role-banner.png" alt-text="Screenshot shows how to assign role to Media Services and Storage accounts from the Azure portal.":::
22+
1. When you select **Assign Role**, the followinging roles are assigned: `Azure Media Services : Contributor` and `Azure Storage : Storage Blob Data Owner`. You can verify or manually set assignments by navigating to the **Identity** menu of your Video Indexer account and selecting **Azure Role Assignments**.
23+
24+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-verify-assigned-roles.png" alt-text="Screenshot of assigned roles from the Azure portal.":::
25+
1. Navigate to your Media Services account and select **Storage accounts**.
26+
27+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-media-services-managed-identity-menu.png" alt-text="Screenshot of Assigned Managed Identity role on the connected storage account for Media Services from the Azure portal.":::
28+
1. Select **Managed identity**. A warning that you have no managed identities will appear. Select **Click here** to configure one.
29+
30+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-media-services-managed-identity-selection.png" alt-text="Screenshot of enable System Managed Identity role on the connected storage account for Media Services from the Azure portal.":::
31+
1. Select **User** or **System-assigned** identity. In this case, choose **System-assigned**.
32+
1. Select **Save**.
33+
1. Select **Storage accounts** in the menu and select **Managed identity** again. This time, the banner that you don’t have a managed identity shouldn't appear. Instead, you can now select the managed identity in the dropdown menu.
34+
1. Select **System-assigned**.
35+
36+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-media-services-managed-identity-system-assigned-selection.png" alt-text="Screenshot of Azure portal to select System Managed Identity role on the connected storage account for Media Services from the Azure portal.":::
37+
1. Select **Save**.
38+
1. Navigate to your Storage account. Select **Networking** from the menu and select **Enabled from selected virtual networks and IP addresses** in the **Public network access** section.
39+
40+
:::image type="content" source="./media/storage-behind-firewall/trusted-service-storage-lock-select-exceptions.png" alt-text="Screenshot of how to disable public access for your storage account and enable exception for trusted services from the Azure portal.":::
41+
1. Under **Exceptions**, make sure that **Allow Azure services on the trusted services list to access this storage account** is selected.
42+
43+
## Summary
44+
45+
This concludes the tutorial. With these steps you've completed the following activities:
46+
47+
1. Assigning the Video Indexer managed-identity the necessary roles to Media Services (Contributor) and Storage (Storage Blob Data Owner).
48+
1. Assigning the Media Services Managed-identity role to the Storage.
49+
1. Locking down your storage account behind firewall and allow Azure Trusted Services to access the Storage account using Managed-identity.
50+
51+
## Next steps
52+
53+
[Disaster recovery](video-indexer-disaster-recovery.md)

articles/azure-video-indexer/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -242,6 +242,9 @@
242242
- name: Network Security
243243
href: network-security.md
244244
displayName: single global Azure Video Indexer service tag, Azure Video Indexer network security options, Azure Video Indexer API endpoint, single global VideoIndexer service tag, The NSG service tags feature, Azure Video Indexer services, Azure Video Indexer account, new Security Tag label, global service tag option, AzureVideoAnalyzerForMedia" Network Service Tag, az network nsg rule, network security description, Network Security Groups, network security rules, old "AzureVideoAnalyzerForMedia" tag, networking security group, Inbound security rules, Service Tag list, Switzerland North Region, existing NSG rule, global tag, IP address prefixes, Azure service, video files, Azure portal, network level, virtual network, Azure CLI, VideoIndexer" tag, other services, network resources, full list, Storage account, classic account, Web Apps, Logic Apps, deployment scripts, frequent updates, IP addresses, easiest way, Next steps, Disaster recovery, CLI commands, ARM account, trial account, title, article, overview, topic, juliako, cases, order, example, jobs, AKS, Functions, NOTE, issues, 9 January, mitigatation, configuration, Use, access, Microsoft, backend, complexity, customer, classic-account, content, regions, method, IPs, image, media/network, nsg-service-tag, source-address-prefixes`, parameters, cli/azure/network, details, servicetags, MyResourceGroup, name, MyNsgRuleWithTags, priority, direction, Tcp, traffic, disaster-recovery
245+
- name: Storage behind Firewall
246+
href: storage-behind-firewall.md
247+
displayName: single global Azure Video Indexer, Azure Video Indexer with storgae behind firewall
245248
- name: Disaster recovery
246249
href: video-indexer-disaster-recovery.md
247250
displayName: two Azure Video Indexer accounts, secondary Azure Video Indexer account, Azure Video Indexer failover, business continuity disaster recovery, Azure paired regions, Azure free trial, regional datacenter outage, disaster recovery description, regional datacenter failure, activity log alerts, service health notifications, secondary account, two options, one account, Azure region, Azure subscription, instant failover, recovery time, regional pairs, service notifications, femila editor, ms.custom, optimal availability, availability policies, multiple tenants, Next steps, primary region, juliako manager, title, author, topic, article, date, environment, apps, BCDR, isolation, information, availability-zones, replication, Prerequisites, microsoft, redundancy, service-notifications, multiple-tenants

0 commit comments

Comments
 (0)