Skip to content

Commit eaeb414

Browse files
author
Jill Grant
authored
Merge pull request #274237 from pauljewellmsft/auth-recs
Add auth recommendation for Storage
2 parents c3cb75d + 3a02990 commit eaeb414

9 files changed

+102
-100
lines changed

articles/storage/blobs/anonymous-read-access-prevent.md

Lines changed: 0 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -382,56 +382,6 @@ end {
382382
}
383383
```
384384

385-
## Verify that anonymous access has been remediated
386-
387-
To verify that you've remediated anonymous access for a storage account, you can test that anonymous access to a blob isn't permitted, that modifying a container's access setting isn't permitted, and that it's not possible to create a container with anonymous access enabled.
388-
389-
### Verify that anonymous access to a blob isn't permitted
390-
391-
To verify that anonymous access to a specific blob is disallowed, you can attempt to download the blob via its URL. If the download succeeds, then the blob is still publicly available. If the blob isn't publicly accessible because anonymous access has been disallowed for the storage account, then you'll see an error message indicating that anonymous access isn't permitted on this storage account.
392-
393-
The following example shows how to use PowerShell to attempt to download a blob via its URL. Remember to replace the placeholder values in brackets with your own values:
394-
395-
```powershell
396-
$url = "<absolute-url-to-blob>"
397-
$downloadTo = "<file-path-for-download>"
398-
Invoke-WebRequest -Uri $url -OutFile $downloadTo -ErrorAction Stop
399-
```
400-
401-
### Verify that modifying the container's access setting isn't permitted
402-
403-
To verify that a container's access setting can't be modified after anonymous access is disallowed for the storage account, you can attempt to modify the setting. Changing the container's access setting fails if anonymous access is disallowed for the storage account.
404-
405-
The following example shows how to use PowerShell to attempt to change a container's access setting. Remember to replace the placeholder values in brackets with your own values:
406-
407-
```powershell
408-
$rgName = "<resource-group>"
409-
$accountName = "<storage-account>"
410-
$containerName = "<container-name>"
411-
412-
$storageAccount = Get-AzStorageAccount -ResourceGroupName $rgName -Name $accountName
413-
$ctx = $storageAccount.Context
414-
415-
Set-AzStorageContainerAcl -Context $ctx -Container $containerName -Permission Blob
416-
```
417-
418-
### Verify that a container can't be created with anonymous access enabled
419-
420-
If anonymous access is disallowed for the storage account, then you won't be able to create a new container with anonymous access enabled. To verify, you can attempt to create a container with anonymous access enabled.
421-
422-
The following example shows how to use PowerShell to attempt to create a container with anonymous access enabled. Remember to replace the placeholder values in brackets with your own values:
423-
424-
```powershell
425-
$rgName = "<resource-group>"
426-
$accountName = "<storage-account>"
427-
$containerName = "<container-name>"
428-
429-
$storageAccount = Get-AzStorageAccount -ResourceGroupName $rgName -Name $accountName
430-
$ctx = $storageAccount.Context
431-
432-
New-AzStorageContainer -Name $containerName -Permission Blob -Context $ctx
433-
```
434-
435385
### Check the anonymous access setting for multiple accounts
436386

437387
To check the anonymous access setting across a set of storage accounts with optimal performance, you can use the Azure Resource Graph Explorer in the Azure portal. To learn more about using the Resource Graph Explorer, see [Quickstart: Run your first Resource Graph query using Azure Resource Graph Explorer](../../governance/resource-graph/first-query-portal.md).

articles/storage/blobs/authorize-access-azure-active-directory.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,19 +6,17 @@ author: pauljewellmsft
66
ms.author: pauljewell
77
ms.service: azure-blob-storage
88
ms.topic: conceptual
9-
ms.date: 03/17/2023
9+
ms.date: 05/10/2024
1010

1111
---
1212

1313
# Authorize access to blobs using Microsoft Entra ID
1414

1515
Azure Storage supports using Microsoft Entra ID to authorize requests to blob data. With Microsoft Entra ID, you can use Azure role-based access control (Azure RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal. The security principal is authenticated by Microsoft Entra ID to return an OAuth 2.0 token. The token can then be used to authorize a request against the Blob service.
1616

17-
Authorization with Microsoft Entra ID provides superior security and ease of use over Shared Key authorization. Microsoft recommends using Microsoft Entra authorization with your blob applications when possible to assure access with minimum required privileges.
18-
1917
Authorization with Microsoft Entra ID is available for all general-purpose and Blob storage accounts in all public regions and national clouds. Only storage accounts created with the Azure Resource Manager deployment model support Microsoft Entra authorization.
2018

21-
Blob storage additionally supports creating shared access signatures (SAS) that are signed with Microsoft Entra credentials. For more information, see [Grant limited access to data with shared access signatures](../common/storage-sas-overview.md).
19+
[!INCLUDE [storage-auth-recommendations](../../../includes/storage-auth-recommendations.md)]
2220

2321
<a name='overview-of-azure-ad-for-blobs'></a>
2422

0 commit comments

Comments
 (0)