We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The StorageAccount in Azure should be configured such that it is managed by the KeyVault and thus the Keyvault handles:
Ideally Terraform has providers for it, otherwise we must execute a shell script.
Benefit: we do not need to store StorageAccount credentials in code anymore, we can simply ask the KeyVault to generate an SAS token on demand.
Use this link as starting point. Or this discussion: https://docs.microsoft.com/en-us/answers/questions/144549/generating-sastokens-for-files-inside-my-blob-stor.html
The text was updated successfully, but these errors were encountered:
as of today this seems to be not yet implemented with terraform, but there's a GitHub issue
Sorry, something went wrong.
paullatzelsperger
No branches or pull requests
The StorageAccount in Azure should be configured such that it is managed by the KeyVault and thus the Keyvault handles:
Ideally Terraform has providers for it, otherwise we must execute a shell script.
Benefit: we do not need to store StorageAccount credentials in code anymore, we can simply ask the KeyVault to generate an SAS token on demand.
Use this link as starting point.
Or this discussion: https://docs.microsoft.com/en-us/answers/questions/144549/generating-sastokens-for-files-inside-my-blob-stor.html
The text was updated successfully, but these errors were encountered: