Let's walk through a practical demonstration on how to use stored access policies to delegate access to Azure Storage, specifically for Blob Storage.
We'll create a stored access policy on a blob container, then generate a SAS token tied to this policy to share access with others.
Scenario
We have a storage account with a container named documents
.
We'll use a stored access policy to grant read-only access to a specific blob (report.pdf
) for a limited period.
Step-by-Step Practical Demonstration
Step 1: Create a Storage Account (If not already created)
Go to the Azure Portal.
In the search bar, type and select Storage Accounts.
Click on + Create to create a new storage account.
Fill in the required fields:
Subscription: Choose your subscription.
Resource Group: Select an existing resource group or create a new one.
Storage Account Name: Choose a unique name for your storage account.
Region: Select your desired region.
Click Review + Create, then Create.
Step 2: Create a Blob Container
Go to the Storage Account you just created.
Under Data Storage, select Containers.
Click on + Container to create a new container.
Name the container
documents
(or any name you prefer).Set the Access Level to Private (no anonymous access).
Click Create.
Step 3: Upload a Blob to the Container
Inside the documents container, click on Upload.
Choose a file to upload (e.g.,
report.pdf
).Click Upload to add the file to the container.
Step 4: Create a Stored Access Policy
Now, we'll create a stored access policy that will control access to the blob.
In the Azure Portal, navigate to the documents container.
Click on the Access policies tab at the top.
Click + Add policy to create a new stored access policy.
Set the following options:
Policy Name:
ReadOnlyPolicy
Permissions: Select Read (
r
) to allow read-only access.Start Time: Leave it blank or set a start time (optional).
Expiry Time: Set the expiry time to control when the SAS token expires (e.g., 1 hour from now).
IP Address Range: (Optional) Limit access to a specific range of IPs.
Allowed Protocols: Choose HTTPS only for secure access.
Click Save to create the policy.
Step 5: Generate a SAS Token Using the Stored Access Policy
Now that we've created a stored access policy, we'll generate a SAS token linked to this policy.
In the documents container, click on the Generate SAS button.
In the SAS Generation window:
Under Signature, select Stored Access Policy.
From the drop-down, choose the ReadOnlyPolicy we just created.
Set the Permissions (e.g.,
r
for read access).Set the Expiry Time (ensure it matches or is before the stored access policy's expiration).
Click Generate SAS and connection string.
Copy the SAS URL or SAS token generated.
Example SAS URL:
xxxxxxxxxx
11//<-- >....//.?=2021-01-01&st=2024-11-30%3A00%3A00Z&se=2024-11-30%3A00%3A00Z&sr=&sp=&sig=<> :
This SAS URL allows read-only access to the report.pdf
blob for one hour, after which the access will be revoked.
Step 6: Share the SAS URL
Now, you can share the SAS URL with anyone who needs access to the report.pdf
blob.
They will be able to access the blob as per the permissions (in this case, read-only) for the duration of the SAS token’s validity.
To test it:
Open the SAS URL in a browser.
The
report.pdf
file will be available for download but cannot be modified.
Step 7: Modify or Revoke Access via Stored Access Policy
To modify or revoke access granted through a stored access policy:
Modify the Stored Access Policy
Go to the documents container in the Azure Portal.
Click on the Access policies tab.
Select the ReadOnlyPolicy.
Click Edit to modify the permissions, start time, or expiry time.
After editing, click Save to apply the changes.
Delete the Stored Access Policy (Revoke Access)
In the Access policies tab, select the ReadOnlyPolicy.
Click Delete to remove the policy.
Once deleted, any existing SAS tokens associated with this policy will be invalidated, effectively revoking access.
Advantages of Using Stored Access Policies
Centralized Control
Manage access permissions centrally through the policy, rather than generating new SAS tokens for each user.
Easier Revocation
If you want to revoke access, just delete the policy and invalidate all SAS tokens tied to it.
Flexible
You can update the policy to change permissions or expiration dates, and those changes automatically apply to all SAS tokens using the policy.
Summary of the Process
Create a Storage Account and Blob Container.
Upload a blob (e.g.,
report.pdf
).Create a Stored Access Policy with specific permissions (e.g., read-only).
Generate a SAS token that is linked to the stored access policy.
Share the SAS URL with users to allow them to access the blob.
If needed, modify or delete the stored access policy to control or revoke access.
By using stored access policies in Azure Storage, you have more control and flexibility over delegating and managing access securely and efficiently.
Leave a Reply