Skip to content

Scott: We've been creating a storage account here

in the Azure portal.

I'm gonna leave the one that we've created in the East US,

and I'm gonna choose locally redundant storage,

and I'm gonna hit next, which will take us

to the advanced tab.

As the name implies,

the advanced tab contains a lot of security, access,

and other settings.

Under security, the first setting says,

"Require secure transfer for REST API operations."

This basically means that you cannot interact

with a storage account using unsecured,

unencrypted, so HTTPS is the only method

for interacting with this over the API.

This here is enabled by default,

and you probably should keep it

unless you have a good reason

for not needing secure transfer.

Second option is enabling anonymous access.

Now, this is a big security risk.

It's happened dozens of times in the past,

where someone is looking around,

and they find an open anonymous storage account

or storage bucket for AWS, so it is off by default,

and unless you're gonna use the storage account

for web files, like images and MP4 files and JavaScripts,

unless you're intending anonymous users

to be able to access them, I would leave it off.

There are two methods of authorization and authentication

to get access to the storage account.

One is what's called storage account key,

and that is on by default.

We're gonna see in a coming up video

about managing your keys.

Basically, the key means if you have the key,

which is a series of letters and numbers that is very long

and impossible to guess,

then you can get access to the storage account,

the contents of it.

So it's what's called claims-based authentication.

Or do you want to use Microsoft Entra,

which is role-based access control that is handled by Entra?

Storage account key is on by default,

because if you're going to be using applications

and legacy applications,

this is what's traditionally been supported.

In order to use Entra, you have your applications register

with Entra, and there's special methods

that they're gonna need to get authorization.

Obviously, TLS 1.2 is the minimum.

I believe it's been shown that 1.0 and 1.1 are,

at this point, insecure,

so leaving it at 1.2 is perfectly fine.

We'll skip over the preview feature.

Now, I mentioned in the last video

that Data Lake Storage Gen2

is a different type of namespace.

It's an actual hierarchical namespace

where you can have files and folders.

In a default storage account with blobs and containers,

it's a container model, and basically,

everything goes into the container.

Data Lake Storage Gen2 is more of a files and folders model

specifically for big data analytics,

and it has different limits

in terms of the amount of data you can store,

and it has different access control policies,

so we're not going to talk about that much in this course.

This is where you would set it up if you want.

You would have to be using Data Lake Storage Gen2

in order to set up SFTP or NFS.

For blob storage,

we have, the most important thing here is the access tier.

Now, access tier is an important concept

and is a requirement for the exam, and so what we'll do,

we'll come back in the next video,

and we'll talk specifically about hot, cool, cold,

and archive.

Released under the MIT License.