stale-businessperson-89737
09/11/2024, 4:39 PMstale-businessperson-89737
09/11/2024, 4:54 PMstale-businessperson-89737
09/11/2024, 4:54 PMstale-businessperson-89737
09/11/2024, 4:54 PMstale-businessperson-89737
09/11/2024, 4:55 PMadventurous-butcher-54166
09/11/2024, 5:51 PMStorage Blob Data [Contributor|Owner|Reader]
roles.
There are two methods of authorizing access to storage account data, via Access Keys and then Azure RBAC. Some clients, like the Storage Account Browser in the Azure Portal will allow you to access data within a storage account by retrieving the storage account access key, that is if the access key option is Enabled.
I personally disable SAS access by default on my storage accounts and use the RBAC data plane roles ā unless there's a specific workload that really needs SAS access.stale-businessperson-89737
09/11/2024, 7:05 PMstale-businessperson-89737
09/11/2024, 7:10 PMadventurous-butcher-54166
09/11/2024, 7:31 PMStorage Blob Data Contributor
role which grants you ability to create, read & delete
2. For read-only access to blobs you would use the Storage Blob Data Reader
role.stale-businessperson-89737
09/12/2024, 5:19 AMread ".pulumi/meta.yaml": blob (key ".pulumi/meta.yaml") (code=Unknown): GET ..."
RESPONSE 403: 403 This request is not authorized to perform this operation using this permission.
ERROR CODE: AuthorizationPermissionMismatch
when calling "pulumi login"stale-businessperson-89737
09/12/2024, 5:25 AMstale-businessperson-89737
09/12/2024, 9:48 AMstale-businessperson-89737
09/12/2024, 1:35 PM