Skip to content

Commit c7a168d

Browse files
authored
Update sas-expiration-policy.md to indicate user delegation keys work
Current text implies that SAS tokens signed with a user delegation (rather than an account key) key are excluded from expiration policy monitoring. However, I just tried it, and the warnings are generated for user delegation SAS tokens as well. This commit clarifies that.
1 parent a8fc8b9 commit c7a168d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/storage/common/sas-expiration-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ When a SAS expiration policy is in effect for the storage account, the signed st
3333

3434
## Configure a SAS expiration policy
3535

36-
When you configure a SAS expiration policy on a storage account, the policy applies to each type of SAS that is signed with the account key. The types of shared access signatures that are signed with the account key are the service SAS and the account SAS.
36+
When you configure a SAS expiration policy on a storage account, the policy applies to each type of SAS that is signed with the account key or with a user delegation key. The types of shared access signatures that are signed with the account key are the service SAS and the account SAS.
3737

3838
### Do I need to rotate the account access keys first?
3939

0 commit comments

Comments
 (0)