Overview of Microsoft Entra ID for tables

When a security principal (a user, group, or application) attempts to access a table resource, the request must be authorized. With Microsoft Entra ID, access to a resource is a two-step process. First, the security principal's identity is authenticated and an OAuth 2.0 token is returned. Next, the token is passed as part of a request to the Table service and used by the service to authorize access to the specified resource.

The authentication step requires that an application request an OAuth 2.0 access token at runtime. If an application is running from within an Azure entity such as an Azure VM, a virtual machine scale set, or an Azure Functions app, it can use a managed identity to access tables.

The authorization step requires that one or more Azure roles be assigned to the security principal. Azure Storage provides Azure roles that encompass common sets of permissions for table data. The roles that are assigned to a security principal determine the permissions that that principal will have.

The following table points to additional information for authorizing access to data in various scenarios:


Language.NETJavaJavaScriptPythonGo
Overview of auth with Microsoft Entra IDHow to authenticate .NET applications with Azure services Azure authentication with Java and Azure Identity Authenticate JavaScript apps to Azure using the Azure SDK Authenticate Python apps to Azure using the Azure SDK N/A
Auth using developer service principalsAuthenticate .NET apps to Azure services during local development using service principals Azure authentication with service principal Auth JS apps to Azure services with service principal Authenticate Python apps to Azure services during local development using service principals Azure SDK for Go authentication with a service principal
Auth using developer or user accountsAuthenticate .NET apps to Azure services during local development using developer accounts Azure authentication with user credentials Auth JS apps to Azure services with dev accounts Authenticate Python apps to Azure services during local development using developer accounts Azure authentication with the Azure SDK for Go
Auth from Azure-hosted appsAuthenticating Azure-hosted apps to Azure resources with the Azure SDK for .NETAuthenticate Azure-hosted Java applicationsAuthenticating Azure-hosted JavaScript apps to Azure resources with the Azure SDK for JavaScriptAuthenticating Azure-hosted apps to Azure resources with the Azure SDK for PythonAuthentication with the Azure SDK for Go using a managed identity
Auth from on-premises appsAuthenticate to Azure resources from .NET apps hosted on-premisesN/AAuthenticate on-premises JavaScript apps to Azure resourcesAuthenticate to Azure resources from Python apps hosted on-premisesN/A
Identity client library overviewAzure Identity client library for .NETAzure Identity client library for JavaAzure Identity client library for JavaScriptAzure Identity client library for PythonAzure Identity client library for Go


Comments

Popular posts from this blog

Azure built-in roles for tables

Explore Dataflows Gen2 in Microsoft Fabric

Select and configure an appropriate method for access to Azure Blobs