IAM

  • 10 Feb

    How to use azure AD RBAC authentication instead of storage keys

    Q: Does Filemover support authentication to Azure Storage using Azure AD with RBAC roles (for example “Storage Blob Data Contributor” or “Storage Blob Data Reader”), instead of using storage account keys or SAS tokens? If this is not currently supported, is it something that is planned for a future release? For security reasons, we are looking to avoid the use of storage account keys and would prefer to rely on role-based access control where possible.

    A: This option was added for Azure Block Blobs in v2026.2.9.0

    • In our example we used Azure as Source:

    limagito filemover azure as source

    • The new Authentication option “Service-to-service Access Token request” is only available for Block Blobs:

    limagito file mover azure AD RBAC authentication

    • Next we selected our Azure Storage Container

    limagito file mover azure container setup

    limagito file mover azure AD RBAC authentication

    Assign Role via Azure Portal:

    1. Go to your Storage Account
    2. Click on Access Control (IAM)
    3. Click Add role assignment
    4. Select role: Storage Blob Data Contributor
    5. Assign access to: User, group, or service principal
    6. Select members: Search for your Service Principal (Application name)
    7. Click Review + assign

    limagito file mover azure storage account iam setup

    Required Azure RBAC roles for Block Blobs:

    To use Block Blobs with OAuth, your Service Principal must have one of these roles:

    RolePermissionsUse Case
    Storage Blob Data ReaderRead, ListRead/download only
    Storage Blob Data ContributorRead, Write, DeleteUpload + Download

    Storage Blob Data Contributor:

    Limagito7 was added using Azure ‘App registrations’

    limagito filemover azure app registrations

    limagito file mover azure app registrations

    Here you can find:

    • Application (Client) ID needed in OAuth2 setup
    • Directory (Tenant) ID needed in OAuth2 setup

    limagito filemover application client ID

    We added a ‘Client secret’ which Value field is used as Client Secret in the OAuth2 setup of our filemover.

    limagito filemover azure client secrets

     

    There is also an alternative, using a ‘Certificate’ instead of a ‘Client secret’, you can add this under ‘Certificates & secrets’ > Certificates > Upload certificate (public part of the key)

    limagito file mover azure certificates and secrets

    In this case the OAuth2 does not need a Client Secret, this is replaced by the Private Key file.

    limagito file mover azure oauth2 setup

    Select Auth Options:

    limagito file mover private key authentication

    If you need any help about this new ‘azure AD RBAC authentication’ option, please let us know.

    Best Regards,

    Limagito Team

    #azure #managedfiletransfer #filetransfer #filemanagement

    By Limagito-Team Azure , ,
SEARCH