How to create Shared Access Signatures (SAS) in Azure


A Shared Access Signature (SAS) in Azure allows secure, time-limited access to resources in a storage account without exposing the storage account's access keys.

Here’s a step-by-step guide to creating a SAS.

Prerequisites

  • You need an Azure Storage account.

  • Ensure you have the required permissions to create SAS tokens:

    • Account SAS: Requires access keys for the storage account.

    • Service SAS or User Delegation SAS: Requires relevant permissions via Azure RBAC roles (e.g., Storage Blob Data Contributor).

Types of Shared Access Signatures

Account SAS

Provides access to all services in the storage account.

Service SAS

Provides access to specific storage resources (e.g., blob, file, queue).

User Delegation SAS

Uses Azure AD and is generated based on Azure AD credentials.

Generate a SAS Using Azure Portal

Steps for an Account SAS or Service SAS

  1. Log into Azure Portal.

  2. Navigate to your Storage Account.

  3. Go to Settings > Shared access signature.

  4. Configure the following settings:

    • Allowed Services: Select the services (Blob, File, Queue, Table) the SAS applies to.

    • Allowed Resource Types: Choose resource types (Service, Container, Object) to include.

    • Permissions: Specify permissions like Read, Write, Delete, etc.

    • Start/Expiry Time: Set a validity period for the SAS token.

    • IP Ranges: Optionally restrict the SAS to specific IP addresses.

    • Protocol: Choose HTTPS only or HTTPS and HTTP.

  5. Click Generate SAS and Connection String.

  6. Copy the SAS token or the connection string for use.

Generate a SAS Using Azure Storage Explorer

  1. Download and install Azure Storage Explorer if not already installed.

  2. Connect your storage account using account keys or Azure AD credentials.

  3. Right-click on a specific resource (e.g., container, file, or blob) and select Get Shared Access Signature.

  4. Configure the permissions, expiry time, and protocols.

  5. Click Create and copy the generated SAS token or URL.

Generate a SAS Using Azure CLI

Use the Azure CLI to generate a SAS token. Here’s an example for a blob container:

This generates a SAS token for the specified container.

For a user delegation SAS, replace --account-key with a --auth-mode parameter:

Generate a SAS Using Azure PowerShell

Run the following example for a blob container:

SAS Token Usage

SAS Token

Append the generated SAS token to your resource URL.

For example:

Connection String

Use the SAS token in your applications’ connection string to access Azure Storage securely.

Best Practices

  • Use User Delegation SAS for enhanced security with Azure AD.

  • Limit permissions and expiry time to the minimum necessary.

  • Use HTTPS to secure communication.

  • Regularly audit and revoke unused SAS tokens.

Summary

By following these steps and best practices, you can create and use SAS tokens securely in Azure.

Related Articles


Rajnish, MCT

Leave a Reply

Your email address will not be published. Required fields are marked *


SUBSCRIBE

My newsletter for exclusive content and offers. Type email and hit Enter.

No spam ever. Unsubscribe anytime.
Read the Privacy Policy.