Skip to content

Commit f68e881

Browse files
Adjust include files
1 parent 223d9f3 commit f68e881

File tree

3 files changed

+10
-8
lines changed

3 files changed

+10
-8
lines changed

articles/storage/common/storage-account-keys-manage.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ When you create a storage account, Azure generates two 512-bit storage account a
1818

1919
Microsoft recommends that you use Azure Key Vault to manage your access keys, and that you regularly rotate and regenerate your keys. Using Azure Key Vault makes it easy to rotate your keys without interruption to your applications. You can also manually rotate your keys.
2020

21+
[!INCLUDE [storage-auth-recommendations](../../../includes/storage-auth-recommendations.md)]
22+
2123
[!INCLUDE [storage-account-key-note-include](../../../includes/storage-account-key-note-include.md)]
2224

2325
## View account access keys

articles/storage/common/storage-configure-connection-string.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ A connection string includes the authorization information required for your app
2222

2323
To learn how to view your account access keys and copy a connection string, see [Manage storage account access keys](storage-account-keys-manage.md).
2424

25+
[!INCLUDE [storage-auth-recommendations](../../../includes/storage-auth-recommendations.md)]
26+
2527
[!INCLUDE [storage-account-key-note-include](../../../includes/storage-account-key-note-include.md)]
2628

2729
## Store a connection string

includes/storage-account-key-note-include.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,22 +2,20 @@
22
title: "include file"
33
description: "include file"
44
services: storage
5-
author: tamram
6-
ms.service: storage
5+
author: pauljewellmsft
6+
ms.service: azure-storage
77
ms.topic: "include"
8-
ms.date: 03/22/2023
9-
ms.author: tamram
8+
ms.date: 05/07/2024
9+
ms.author: pauljewell
1010
ms.custom: "include file", engagement-fy23
1111
---
1212

1313
## Protect your access keys
1414

15-
Storage account access keys provide full access to the configuration of a storage account, as well as the data. Always be careful to protect your access keys. Use Azure Key Vault to manage and rotate your keys securely. Access to the shared key grants a user full access to a storage account’s configuration and its data. Access to shared keys should be carefully limited and monitored. Use SAS tokens with limited scope of access in scenarios where Microsoft Entra ID based authorization can't be used. Avoid hard-coding access keys or saving them anywhere in plain text that is accessible to others. Rotate your keys if you believe they might have been compromised.
15+
Storage account access keys provide full access to the configuration of a storage account, as well as the data. Always be careful to protect your access keys. Use Azure Key Vault to manage and rotate your keys securely. Access to the shared key grants a user full access to a storage account’s configuration and its data. Access to shared keys should be carefully limited and monitored. Use user delegation SAS tokens with limited scope of access in scenarios where Microsoft Entra ID based authorization can't be used. Avoid hard-coding access keys or saving them anywhere in plain text that is accessible to others. Rotate your keys if you believe they might have been compromised.
1616

1717
> [!IMPORTANT]
18-
> Microsoft recommends using Microsoft Entra ID to authorize requests against blob, queue, and table data if possible, rather than using the account keys (Shared Key authorization). Authorization with Microsoft Entra ID provides superior security and ease of use over Shared Key authorization. For more information about using Microsoft Entra authorization from your applications, see [How to authenticate .NET applications with Azure services](/dotnet/azure/sdk/authentication). For SMB Azure file shares, Microsoft recommends using on-premises Active Directory Domain Services (AD DS) integration or Microsoft Entra Kerberos authentication.
19-
>
20-
> To prevent users from accessing data in your storage account with Shared Key, you can disallow Shared Key authorization for the storage account. Granular access to data with least privileges necessary is recommended as a security best practice. Microsoft Entra ID based authorization should be used for scenarios that support OAuth. Kerberos or SMTP should be used for Azure Files over SMB. For Azure Files over REST, SAS tokens can be used. Shared key access should be disabled if not required to prevent its inadvertent use. For more information, see [Prevent Shared Key authorization for an Azure Storage account](../articles/storage/common/shared-key-authorization-prevent.md).
18+
> To prevent users from accessing data in your storage account with Shared Key, you can disallow Shared Key authorization for the storage account. Granular access to data with least privileges necessary is recommended as a security best practice. Microsoft Entra ID based authorization using managed identities should be used for scenarios that support OAuth. Kerberos or SMTP should be used for Azure Files over SMB. For Azure Files over REST, SAS tokens can be used. Shared key access should be disabled if not required to prevent its inadvertent use. For more information, see [Prevent Shared Key authorization for an Azure Storage account](../articles/storage/common/shared-key-authorization-prevent.md).
2119
>
2220
> To protect an Azure Storage account with Microsoft Entra Conditional Access policies, you must disallow Shared Key authorization for the storage account.
2321
>

0 commit comments

Comments
 (0)