File Mover Blog

February 10, 2026

How to use azure AD RBAC authentication instead of storage keys

Q: Does Filemover support authentication to Azure Storage using Azure AD with RBAC roles (for example “Storage Blob Data Contributor” or “Storage Blob Data Reader”), instead of using storage account keys or SAS tokens? If this is not currently supported, is it something that is planned for a future release? For security reasons, we are looking to avoid the use of storage account keys and would prefer to rely on role-based access control where possible.

A: This option was added for Azure Block Blobs in v2026.2.9.0

  • In our example we used Azure as Source:

limagito filemover azure as source

  • The new Authentication option “Service-to-service Access Token request” is only available for Block Blobs:

limagito file mover azure AD RBAC authentication

  • Next we selected our Azure Storage Container

limagito file mover azure container setup

limagito file mover azure AD RBAC authentication

Assign Role via Azure Portal:

  1. Go to your Storage Account
  2. Click on Access Control (IAM)
  3. Click Add role assignment
  4. Select role: Storage Blob Data Contributor
  5. Assign access to: User, group, or service principal
  6. Select members: Search for your Service Principal (Application name)
  7. Click Review + assign

limagito file mover azure storage account iam setup

Required Azure RBAC roles for Block Blobs:

To use Block Blobs with OAuth, your Service Principal must have one of these roles:

RolePermissionsUse Case
Storage Blob Data ReaderRead, ListRead/download only
Storage Blob Data ContributorRead, Write, DeleteUpload + Download

Storage Blob Data Contributor:

Limagito7 was added using Azure ‘App registrations’

limagito filemover azure app registrations

limagito file mover azure app registrations

Here you can find:

  • Application (Client) ID needed in OAuth2 setup
  • Directory (Tenant) ID needed in OAuth2 setup

limagito filemover application client ID

We added a ‘Client secret’ which Value field is used as Client Secret in the OAuth2 setup of our filemover.

limagito filemover azure client secrets

 

There is also an alternative, using a ‘Certificate’ instead of a ‘Client secret’, you can add this under ‘Certificates & secrets’ > Certificates > Upload certificate (public part of the key)

limagito file mover azure certificates and secrets

In this case the OAuth2 does not need a Client Secret, this is replaced by the Private Key file.

limagito file mover azure oauth2 setup

Select Auth Options:

limagito file mover private key authentication

If you need any help about this new ‘azure AD RBAC authentication’ option, please let us know.

Best Regards,

Limagito Team

#azure #managedfiletransfer #filetransfer #filemanagement

By Limagito-Team Azure , , Share:
SEARCH