Private access to exact container in Azure Storage Explorer - azure

I need to store some sensitive data in one container in Storage Explorer. The container has Container Public Access Level set as No public access. But still all members have access to this container. Where to change the settings (Azure Active Directory, Access policy, Acess control) to be absolutely sure that no one except two people can see the content. I need to have it under control before I put something there.

Storage Explorer supports Azure RBAC access to Storage Accounts, Blobs, and Queues which give you fine-grained access control over your Azure resources. Azure roles and permissions can be managed from the Azure portal.
You can scope access to Azure blob resources at the an individual container level: Authorize access to blobs using Active Directory - Azure Storage | Microsoft Docs
Select the container for which users access has to be controlled.
Click Access control (IAM) in the container and Click on add
assignment .
Select appropriate role to allow for the users.
And then select the users who can have the access to that container
according to the role .Please check the data actions and not data
actions to see what exact permissions apply to them
References:
storage-explorer-security
Assign roles
Just like role assignment,you can check Azure deny assignments can attach few deny actions to a user, group, or service principal for scope required to deny access.
It blocks users from performing specific Azure resource actions even if role is been granted access.
deny-assignments-portal
Note:Azure Blueprints and Azure managed apps are the only way
that deny assignments are used within Azure.

Related

Hide folder from directory listing in Azure Storage

This seems like a simple thing, but I've been unable to find an answer
I'm using Azure Storage, and I have a folder in the container that has some sensitive documents in it. So I'd like to be able to "hide" the folder and it's contents from the directory listing. Is this possible? The only thing I can find is to change the Access Level of the entire container.
If there's not a way to do this, what's the proper way to hide Azure Storage docs from public access?
There is no feature in Azure Storage to hide the content in the Azure Container folder.
There is an alternate approach to secure the Azure Storage container files.
Thanks to Niclas for suggesting the same.
Assign RBAC roles to your Azure Container, like below.
Azure Portal > Storage accounts > Select your storage account > Container > Select your container > Access Control (IAM)
When I tried with another Azure AD user, who doesn't have any RBAC roles to check the Azure container files.
The user is unable to access the Azure Container.
I have assigned Storage Blob Data Contributor to the same user on Storage Account to check the Azure Container files.
Once assign the RBAC roles to the user, the same user can access the Azure Container.
Referance: Assign an Azure role for access to blob data.

Restrict SQL Server access for users having contributor access to subscription in azure

We have added the Contributor role to my azure subscription. And all the user in my directory having the Contributor role. So all the user are able to access the databases/sql servers created in my subscription.
So the problem here is, we have production sql databases exist in same subscription. We wanted to restrict the access for the specific databases. How can we do restrict access to the sql server/database?(Consider all the users are having contributor role and contributor role is assigned to subscription)
Thanks
I do not believe this is possible, unless the resources were created using Azure Blueprints, in which case, you can use a Deny Assignment to restrict access.
You will either need to assign the RBAC roles directly to the resource groups or the individual resources, rather than at the subscription level. Or, if possible, you should consider moving your production resources to another subscription.

Restricting Access to what users can see in the Azure portal

For users that are assigned only a resource contributor role (such as Storage File Data SMB Share Contributor) the desired outcome is for them to see only the storage resources in Azure to which they are assigned
With this role, users can still see, however, the Subscription ID, a list of devices in Azure Active Directory, can log into Microsoft Intune, etc.
We have tried enabling "Restrict access to Azure Admin Portal" but some details are still visible. https://learn.microsoft.com/en-us/azure/active-directory/fundamentals/users-default-permissions#restrict-member-users-default-permissions
I am looking for guidance on how to ensure restricted access for users with a resource contributor role assigned.
Ability to see the existence of an Azure subscription when you have any role assigned to a resource in the subscription is special behavior provided by ARM to allow users to browse to the resources they have access to...
The other items (devices in Azure AD, Intune) are not controlled by Azure RBAC roles. You should find that the users have the same permissions even if you remove their Azure RBAC role assignments.
These systems have independent authorization logic which may be granting some access to all users.

Cannot set Azure Active Directory Admin in Azure SQL Database

I cannot set Azure Active Directory Admin in Azure SQL Database for myself.
attached pic
To set the as the Azure Active Directory Admin in the Azure SQL Server : You have to have the Owner role or the Contributor:
As, Azure AD is nothing but an identity store in Azure. Here we can
define users, groups, applications, and service principles. These
users can authenticate onto Azure and they can access resources that
are part of Azure subscription.
We can assign Azure AD roles to a user and these permissions are
normally given to manage the various aspects of Azure AD.
Role-based access control (RBAC), on the other hand, is used to authorise a user to use Azure resources. ​
For example, you might grant a user the ability to create a storage
account or manage resource groups by assigning them a role.
At the management group, subscription, resource group, or resource level, role-based access control can be implemented.
RBAC has three basic roles that apply to all resource types:
Owner: This role has full access to all the resources and can delegate
access to others.
Contributor: This role can create and manage all types of resources,
but can’t grant access to other users and groups.
Reader: This role can view existing Azure resources.
Here, is the way I am able to add, as the assigned role to me is Contributor Role.
Once you have the Owner or Contributor Role you will be able to add the Azure Active Directory Admin for the SQL server:

How I can select a specific AD in IAM menu

When I select an IAM menu (Identity + Acces Management) I see a list of user accounts extracted from my Azure AD
But I have several AD.From what criteria Azure select an AD rather another one?
Hi assuming your question is that you have multiple Azure Active Directories, rather than multiple on-prem ADs that you need to sync - then via the preview management blades in the new portal can you change which Direcotry they list via the icon on the top right which shows your logged in user. From there simply select the Directory you wish to manage.
It is only able to grant the access to the users in the Azure Active Directory which the Azure subscription trust. It is not able to switch the Azure Active Directory to grant the access.
Each Azure subscription is associated with one Azure Active Directory (AD) directory. Users, groups, and applications from that directory can manage resources in the Azure subscription. Assign these access rights using the Azure portal, Azure command-line tools, and Azure Management APIs.
Grant access by assigning the appropriate RBAC role to users, groups, and applications at a certain scope. The scope of a role assignment can be a subscription, a resource group, or a single resource. A role assigned at a parent scope also grants access to the children contained within it. For example, a user with access to a resource group can manage all the resources it contains, like websites, virtual machines, and subnets.
The RBAC role that you assign dictates what resources the user, group, or application can manage within that scope.
Here are some helpful articles about Role-based access control and Azure subscription:
How Azure subscriptions are associated with Azure Active Directory
Get started with access management in the Azure portal
Use role assignments to manage access to your Azure subscription resources

Resources