Skip to content

Commit ed23d31

Browse files
committed
removed section: shared access key
1 parent ac73419 commit ed23d31

File tree

1 file changed

+1
-11
lines changed

1 file changed

+1
-11
lines changed

articles/storage/blobs/blob-containers-portal.md

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: stevenmatthew
77

88
ms.service: storage
99
ms.topic: how-to
10-
ms.date: 04/13/2022
10+
ms.date: 07/18/2022
1111
ms.author: shaas
1212
ms.subservice: blobs
1313
---
@@ -84,16 +84,6 @@ Azure Active Directory (Azure AD) offers optimum security for Blob Storage resou
8484

8585
You can read about the assignment of roles at [Assign Azure roles using the Azure portal](assign-azure-role-data-access.md?tabs=portal).
8686

87-
### Use Shared Key authorization for data access
88-
89-
A request to Azure Storage can be authorized using either your Azure AD account or the storage account access key. You can use portal to determine which method you are using, and switch between the two if you have the appropriate permissions. Follow the steps within the [Determine the current authentication method](authorize-data-operations-portal.md#determine-the-current-authentication-method) section.
90-
91-
You may choose to use Azure AD authorization by default for data access when you create a storage account. You can accomplish this by following the steps within [Default to Azure AD authorization in the Azure portal](authorize-data-operations-portal.md#default-to-azure-ad-authorization-in-the-azure-portal).
92-
93-
Shared Key authentication does not associate an identity with the caller, therefore permission-based authorization cannot be performed. The caller can receive full access to all operations on all resources including data, setting owner, and access control lists (ACLs).
94-
95-
To minimize potential security vulnerabilities inherent in Shared Key, Azure AD authorization is recommended for use with your blobs when possible. For more information, read [Authorize access to blobs using Azure Active Directory](authorize-access-azure-active-directory.md). To disable Shared Key access, follow the steps within the [Prevent Shared Key authorization for an Azure Storage account](../common/shared-key-authorization-prevent.md?tabs=portal) article.
96-
9787
### Enable anonymous public read access
9888

9989
Although anonymous read access for containers is supported, it's disabled by default. All access requests must require authorization until anonymous access is explicitly enabled. After anonymous access is enabled, any client will be able to read data within that container without authorizing the request.

0 commit comments

Comments
 (0)