Skip to content

Commit fd888ea

Browse files
Merge pull request #314497 from msmbaldwin/kv-retire-storage-key-links
Update links to retired KV-managed storage account articles
2 parents f0385dc + 0e8d583 commit fd888ea

8 files changed

Lines changed: 9 additions & 10 deletions

File tree

articles/role-based-access-control/built-in-roles/storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1102,7 +1102,7 @@ Lets you manage classic storage accounts, but not access to them.
11021102

11031103
Classic Storage Account Key Operators are allowed to list and regenerate keys on Classic Storage Accounts
11041104

1105-
[Learn more](/azure/key-vault/secrets/overview-storage-keys)
1105+
[Learn more](/azure/storage/common/authorize-data-access)
11061106

11071107
> [!div class="mx-tableFixed"]
11081108
> | Actions | Description |

articles/security/fundamentals/secrets-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Individual services may have additional best practices and guidance for protecti
104104
- Machine Learning Service: [Use authentication credential secrets in Azure Machine Learning jobs](/azure/machine-learning/how-to-use-secrets-in-runs)
105105
- Service Fabric: [KeyVaultReference support for Service Fabric applications](/azure/service-fabric/service-fabric-keyvault-references)
106106
- SQL IaaS: [Configure Azure Key Vault integration for SQL Server on Azure VMs (Resource Manager)](/azure/azure-sql/virtual-machines/windows/azure-key-vault-integration-configure)
107-
- Storage: [Manage storage account keys with Key Vault and the Azure CLI](/azure/key-vault/secrets/overview-storage-keys)
107+
- Storage: [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access)
108108

109109
## Next steps
110110

articles/storage/common/storage-account-keys-manage.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,10 +77,9 @@ To view or read an account's access keys, the user must either be a Service Admi
7777

7878
## Use Azure Key Vault to manage your access keys
7979

80-
Microsoft recommends using Azure Key Vault to manage and rotate your access keys. Your application can securely access your keys in Key Vault, so that you can avoid storing them with your application code. For more information about using Key Vault for key management, see the following articles:
80+
Microsoft recommends using Microsoft Entra ID and managed identities to authorize access to Azure Storage. If you must use access keys, store them in Azure Key Vault and rotate them regularly. For more information, see the following article:
8181

82-
- [Manage storage account keys with Azure Key Vault and PowerShell](/azure/key-vault/secrets/overview-storage-keys-powershell)
83-
- [Manage storage account keys with Azure Key Vault and the Azure CLI](/azure/key-vault/secrets/overview-storage-keys)
82+
- [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access)
8483

8584
## Manually rotate access keys
8685

articles/storage/common/storage-configure-connection-string.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ To learn how to view your account access keys and copy a connection string, see
3131

3232
Your application needs to access the connection string at runtime to authorize requests made to Azure Storage. You have several options for storing your account access keys or connection string:
3333

34-
- You can store your account keys securely in Azure Key Vault. For more information, see [About Azure Key Vault managed storage account keys](/azure/key-vault/secrets/about-managed-storage-account-keys).
34+
- Microsoft recommends using Microsoft Entra ID to authorize access to Azure Storage instead of account keys. If you must use account keys, store them securely in Azure Key Vault. For more information, see [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access).
3535
- You can store your connection string in an environment variable.
3636
- An application can store the connection string in an **app.config** or **web.config** file. Add the connection string to the **AppSettings** section in these files.
3737

articles/storage/files/storage-dotnet-how-to-use-files.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -538,7 +538,7 @@ static async Task ListDirectoryTreeAsync(ShareDirectoryClient directory)
538538
>[!NOTE]
539539
> OAuth tokens, such as those obtained when using `DefaultAzureCredential`, aren't allowed for data plane operations at the file share level. To work with share snapshots, the client object must be authorized using the account key. The `ShareClient` object created in this code example uses a connection string, which includes the account key.
540540
>
541-
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely storing account keys in Azure Key Vault, see [About Azure Key Vault managed storage account keys](/azure/key-vault/secrets/about-managed-storage-account-keys).
541+
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely authorizing access to storage, see [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access).
542542
543543
## Manage Azure Files resources using the Azure Storage management libraries
544544

articles/storage/files/storage-java-how-to-use-file-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -622,7 +622,7 @@ private static void listDirectoryTree(ShareDirectoryClient directory) {
622622
>[!NOTE]
623623
> OAuth tokens, such as those obtained when using `DefaultAzureCredential`, aren't allowed for data plane operations at the file share level. To work with share snapshots, the client object must be authorized using the account key. The `ShareClient` object created in this code example uses a connection string, which includes the account key.
624624
>
625-
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely storing account keys in Azure Key Vault, see [About Azure Key Vault managed storage account keys](/azure/key-vault/secrets/about-managed-storage-account-keys).
625+
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely authorizing access to storage, see [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access).
626626
627627
## Manage Azure Files resources using the Azure Storage management libraries
628628

articles/storage/files/storage-python-how-to-use-file-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -460,7 +460,7 @@ list_root_directory_snapshot(root_dir)
460460
>[!NOTE]
461461
> OAuth tokens, such as those obtained when using `DefaultAzureCredential`, aren't allowed for data plane operations at the file share level. To work with share snapshots, the client object must be authorized using the account key. The `ShareClient` object created in this code example uses a connection string, which includes the account key.
462462
>
463-
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely storing account keys in Azure Key Vault, see [About Azure Key Vault managed storage account keys](/azure/key-vault/secrets/about-managed-storage-account-keys).
463+
> Storing account keys or connection strings presents a security risk. You should only use them when Microsoft Entra authentication isn't available. To learn more about securely authorizing access to storage, see [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access).
464464
465465
## Manage Azure Files resources using the Azure Storage management libraries
466466

articles/synapse-analytics/spark/synapse-file-mount-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ mssparkutils.fs.mount(
102102

103103
In addition to mounting through a linked service, `mssparkutils` supports explicitly passing an account key or [shared access signature (SAS)](/samples/azure-samples/storage-dotnet-sas-getting-started/storage-dotnet-sas-getting-started/) token as a parameter to mount the target.
104104

105-
For security reasons, we recommend that you store account keys or SAS tokens in Azure Key Vault (as the following example screenshot shows). You can then retrieve them by using the `mssparkutil.credentials.getSecret` API. For more information, see [Manage storage account keys with Key Vault and the Azure CLI (legacy)](/azure/key-vault/secrets/overview-storage-keys).
105+
For security reasons, we recommend using managed identities and Microsoft Entra authentication instead of account keys or SAS tokens when possible. If you must use account keys, store them in Azure Key Vault (as the following example screenshot shows). You can then retrieve them by using the `mssparkutil.credentials.getSecret` API. For more information, see [Authorize access to data in Azure Storage](/azure/storage/common/authorize-data-access).
106106

107107
![Screenshot that shows a secret stored in a key vault.](./media/synapse-file-mount-api/key-vaults.png)
108108

0 commit comments

Comments
 (0)