官术网_书友最值得收藏!

Configuring network access to the storage account

You can secure your storage account to a specific set of supported networks. For this, you have to configure network rules so that only applications that request data over the specific set of networks can access the storage account. When these network rules are effective, the application needs to use proper authorization on the request. This authorization can be provided by Azure Active Directory credentials for blobs and queues, with an SAS token or a valid account access key.

In the following demonstration, we are going to configure network access to the storage account that we created in the previous step. You can manage storage accounts through the Azure portal, PowerShell, or CLIv2. We are going to set this configuration from the Azure portal. Therefore, we have to perform the following steps:

  1. Navigate to the Azure portal by opening https://portal.azure.com.
  2. Go to the storage account that we created in the previous step.
  1. From the overview blade, in the left-hand menu, select Firewalls and virtual networks:
Storage account overview blade
  1. To grant access to a virtual network with a new network rule, under Virtual Networks, there are two options to choose from: All networks, which allows traffic from all networks (both virtual and on-premises) and the internet to access the data, and Selected networks. If you select this option, you can configure which networks are allowed to access the data from the storage account. Select Selected networks. Then, you can select whether you want to add an existing virtual network or create a new one. For this demonstration, click on + Add new virtual network:
Creating a new network
  1. A new blade will open, where you will have to specify the network configuration. Specify the configuration that's shown in the following screenshot:
Network configuration settings
  1. Click on Create.
  2. The virtual network will be added to the overview blade. This storage account is now secure and can be accessed only from applications and other resources that use this virtual network. In this same blade, you can also configure the firewall and only allow certain IP ranges from the internet or your on-premises environment:
IP ranges

This concludes this demonstration. In the next demonstration, we are going to generate and manage SAS.

主站蜘蛛池模板: 大兴区| 固阳县| 莎车县| 独山县| 读书| 锡林郭勒盟| 禹城市| 桃江县| 威信县| 九寨沟县| 特克斯县| 昌吉市| 新竹县| 富平县| 喜德县| 高州市| 吉水县| 伊川县| 邵武市| 敖汉旗| 中西区| 台中市| 舞阳县| 肥西县| 铁力市| 宜宾县| 建阳市| 华宁县| 潍坊市| 德令哈市| 荥经县| 孟连| 竹溪县| 峨山| 鸡西市| 宁乡县| 乐安县| 毕节市| 丰镇市| 霞浦县| 蒲江县|