Configure Azure Blob delegated access
What you will achieve
You will configure Azure Blob access for Flashback using Microsoft Entra ID + RBAC so you can avoid long-lived storage account keys where possible.
Azure delegated access model (practical view)
For delegated access, assign data-plane RBAC roles to the Flashback Azure identity (guest user or service principal) at the right scope:
Storage account scope when access should apply to many containers.
Container scope when you want narrower least-privilege access.
Use Entra ID + RBAC where possible. Account keys are broad, long-lived secrets and should be treated as fallback.
Prerequisites
An Azure subscription.
A storage account and target container.
Permissions to assign RBAC roles (for example Owner or User Access Administrator at the target scope).
The Flashback Azure identity identifier (guest user object ID or service principal app/object ID).
If you do not have it, obtain it from Flashback support or from the Flashback UI/documentation available in your organization.
Step-by-step (Azure Portal)
Identify the target scope
Choose where to assign permissions:
Storage account: broader scope, easier operations.
Container: tighter least-privilege boundary (recommended when only specific containers are needed).
In Azure Portal, open your Storage Account, then either:
stay at storage account level, or
open Data storage → Containers → your-container for container-level scope.
Add role assignment for Flashback identity
Open Access control (IAM) on the selected scope.
Click Add → Add role assignment.
Select a minimum role based on required operations:
Storage Blob Data Reader (read-only)
Storage Blob Data Contributor (read/write/delete for blob data)
Assign access to the Flashback Azure identity (guest user or service principal).
Save the assignment.
Use the smallest role that satisfies your workflow. Avoid account-wide roles if container-level access is enough.
Configure the bucket in Flashback
In Flashback, follow Configure a Bucket and select:
Storage Type:
Azure BlobStorage Account: your Azure storage account name
Container: your target container
Access Key: may be left blank for delegated guest access when supported by your product flow (as documented in the bucket configuration guide)
Troubleshooting
RBAC changes seem ignored: role propagation can take several minutes.
Wrong scope assigned: confirm the role is assigned at the correct container or storage-account scope.
Role mismatch: ensure you granted a data-plane blob role (for example Storage Blob Data Reader/Contributor), not only management-plane permissions.
Guest account restrictions: some tenants restrict B2B/guest permissions; verify tenant policies for external principals.
Last updated
Was this helpful?