You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/develop/multi-service-web-app-access-storage.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ manager: CelesteDG
7
7
ms.service: app-service
8
8
ms.topic: tutorial
9
9
ms.workload: identity
10
-
ms.date: 04/25/2021
10
+
ms.date: 03/24/2023
11
11
ms.author: ryanwi
12
12
ms.reviewer: stsoneff
13
13
ms.devlang: csharp, javascript
@@ -64,7 +64,7 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
64
64
65
65
1. On the Azure portal menu, select **All services**. In the list of resources, enter **Storage Accounts**. As you begin typing, the list filters based on your input. Select **Storage Accounts**.
66
66
67
-
1. In the **Storage Accounts** window that appears, select **Add**.
67
+
1. In the **Storage Accounts** window that appears, select **Create**.
68
68
69
69
1. Select the subscription in which to create the storage account.
70
70
@@ -74,33 +74,27 @@ To create a general-purpose v2 storage account in the Azure portal, follow these
74
74
75
75
1. Select a location for your storage account, or use the default location.
76
76
77
-
1.Leave these fields set to their default values:
77
+
1.For **Performance**, select the **Standard** option.
1. For **Redundancy**, select the **Locally-redundant storage (LRS)** option from the dropdown.
86
80
87
-
1. Select **Review + Create** to review your storage account settings and create the account.
81
+
1. Select **Review** to review your storage account settings and create the account.
88
82
89
83
1. Select **Create**.
90
84
91
85
To create a Blob Storage container in Azure Storage, follow these steps.
92
86
93
87
1. Go to your new storage account in the Azure portal.
94
88
95
-
1. In the left menu for the storage account, scroll to the **Blob service** section, and then select **Containers**.
89
+
1. In the left menu for the storage account, scroll to the **Data storage** section, and then select **Containers**.
96
90
97
91
1. Select the **+ Container** button.
98
92
99
93
1. Type a name for your new container. The container name must be lowercase, must start with a letter or number, and can include only letters, numbers, and the dash (-) character.
100
94
101
95
1. Set the level of public access to the container. The default level is **Private (no anonymous access)**.
102
96
103
-
1. Select **OK** to create the container.
97
+
1. Select **Create** to create the container.
104
98
105
99
# [PowerShell](#tab/azure-powershell)
106
100
@@ -172,7 +166,15 @@ You need to grant your web app access to the storage account before you can crea
172
166
173
167
In the [Azure portal](https://portal.azure.com), go into your storage account to grant your web app access. Select **Access control (IAM)** in the left pane, and then select **Role assignments**. You'll see a list of who has access to the storage account. Now you want to add a role assignment to a robot, the app service that needs access to the storage account. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
174
168
175
-
Assign the **Storage Blob Data Contributor** role to the **App Service** at subscription scope. For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
169
+
1. In the **Assignment type** tab, select **Job function type** and then **Next**.
170
+
171
+
1. In the **Role** tab, select **Storage Blob Data Contributor** role from the dropdown and then select **Next**.
172
+
173
+
1. In the **Members** tab, select **Assign access to** -> **Managed identity** and then select **Members** -> **Select members**. In the **Select managed identities** window, find and select the managed identity created for your App Service in the **Managed identity** dropdown. Select the **Select** button.
174
+
175
+
1. Select **Review and assign** and then select **Review and assign** once more.
176
+
177
+
For detailed steps, see [Assign Azure roles using the Azure portal](../../role-based-access-control/role-assignments-portal.md).
176
178
177
179
Your web app now has access to your storage account.
0 commit comments