IAM

  • 10 Feb

    How to use azure AD RBAC authentication instead of storage keys

    Q: Does Filemover support authentication to Azure Storage using Azure AD with RBAC roles (for example “Storage Blob Data Contributor” or “Storage Blob Data Reader”), instead of using storage account keys or SAS tokens? If this is not currently supported, is it something that is planned for a future release? For security reasons, we are looking to avoid the use of storage account keys and would prefer to rely on role-based access control where possible.

    A: This option was added for Azure Block Blobs in v2026.2.9.0

    • In our example we used Azure as Source:

    limagito filemover azure as source

    • The new Authentication option “Service-to-service Access Token request” is only available for Block Blobs:

    limagito file mover azure AD RBAC authentication

    • Next we selected our Azure Storage Container

    limagito file mover azure container setup

    limagito file mover azure AD RBAC authentication

    Assign Role via Azure Portal:

    1. Go to your Storage Account
    2. Click on Access Control (IAM)
    3. Click Add role assignment
    4. Select role: Storage Blob Data Contributor
    5. Assign access to: User, group, or service principal
    6. Select members: Search for your Service Principal (Application name)
    7. Click Review + assign

    limagito file mover azure storage account iam setup

    Required Azure RBAC roles for Block Blobs:

    To use Block Blobs with OAuth, your Service Principal must have one of these roles:

    RolePermissionsUse Case
    Storage Blob Data ReaderRead, ListRead/download only
    Storage Blob Data ContributorRead, Write, DeleteUpload + Download

    If you need any help about this new ‘azure AD RBAC authentication’ option, please let us know.

    Best Regards,

    Limagito Team

    #azure #managedfiletransfer #filetransfer #filemanagement

    By Limagito-Team Azure , ,
SEARCH