Skip to content

Configure Access and Identity

Secure storage access using RBAC and identity-based controls.

RBAC Role Permissions Use Case
Storage Blob Data Reader Read-only access to blobs. Application read operations.
Storage Blob Data Contributor Read/write/delete blobs. Application data management.
Storage Blob Data Owner Full access to blob containers and data; can set POSIX ACLs for HNS-enabled accounts. Does not grant RBAC role assignment. Data ownership / ACL management.
Storage Account Contributor Manage account settings. Infrastructure management.

Warning

Disable shared key access whenever possible to enforce modern identity-based authentication.

mermaid graph TD A[Identify Identity] --> B[Assign RBAC Role] B --> C[Set Scope: Account/Container] C --> D[Test Access] D --> E[Monitor Access Logs]

Access Validation Checklist

  • Verify principal type: user, group, or managed identity.
  • Assign data plane roles for data operations.
  • Assign control plane roles only for resource management.
  • Scope assignments to subscription, account, container, or share.
  • Validate token audience and tenant alignment.
  • Confirm diagnostics capture authorization failures.

See Also

Sources