Skip to content

Commit b846946

Browse files
committed
recommend generating sas token using azure portal and restricting IPs
1 parent bf0c762 commit b846946

File tree

1 file changed

+7
-31
lines changed

1 file changed

+7
-31
lines changed

docs/migrate/migration-import.md

+7-31
Original file line numberDiff line numberDiff line change
@@ -488,40 +488,16 @@ After the import has finished, you can delete the blob container and accompanyin
488488
> [!NOTE]
489489
> If your DACPAC file is larger than 10 GB, we recommend that you use AzCopy. AzCopy has multithreaded upload support for faster uploads.
490490

491-
### Step 4: Generate an SAS key
491+
### Step 4: Generate an SAS token
492492

493-
A [shared access signature (SAS) key](/azure/storage/common/storage-sas-overview) provides delegated access to resources in a storage account. The key allows you to give Microsoft the lowest level of privilege that's required to access your data for executing the import.
493+
A [shared access signature (SAS) token](/azure/storage/common/storage-sas-overview) provides delegated access to resources in a storage account. The token allows you to give Microsoft the lowest level of privilege that's required to access your data for executing the import.
494494

495-
The recommended way to generate an SAS key is to use [Azure Storage Explorer](https://storageexplorer.com/). With Storage Explorer, you can easily create container-level SAS keys. This is essential, because the data migration tool does *not* support account-level SAS keys.
495+
SAS tokens can be [generated using the Azure Portal](azure/storage/blobs/blob-containers-portal#generate-a-shared-access-signature). From a security point-of-view, we recommend:
496496

497-
> [!NOTE]
498-
> Do *not* generate an SAS key from the Azure portal. Azure portal-generated SAS keys are account scoped and don't work with the data migration tool.
499-
500-
After you install Storage Explorer, you can generate an SAS key by doing the following:
501-
502-
1. Open Storage Explorer.
503-
1. Add an account.
504-
1. Select **Use a storage account name and key**, and then select **Connect**.
505-
506-
![Screenshot of the Connect to Azure Storage pane.](media/migration-import/StorageExplorerAddAccount.png)
507-
508-
1. On the **Attach External Storage** pane, enter your storage account name, provide one of your two [primary access keys](/azure/storage/common/storage-create-storage-account), and then select **Connect**.
509-
510-
![Screenshot of the Attach External Storage pane for enter information to connect to the storage account.](media/migration-import/StorageExplorerConnectAccount.png)
511-
512-
1. On the left pane, expand **Blob Containers**, right-click the container that stores your import files, and then select **Get Shared Access Signature**.
513-
514-
![Screenshot of the command for selecting the container to create an SAS key.](media/migration-import/StorageExplorerGetSAS.png)
515-
516-
1. For **Expiry time**, set the expiration date for seven days in the future.
517-
518-
![Set the required properties and create the SAS key](media/migration-import/StorageExplorerCreateSAS.png)
519-
520-
1. Under **Permissions** for your SAS key, select the **Read** and **List** check boxes. Write and delete permissions aren't required.
521-
522-
> [!NOTE]
523-
> * Copy and store this SAS key to place in your import specification file in the next step.
524-
> * Treat this SAS key as a secret. It provides access to your files in the storage container.
497+
1. Selecting only **Read** and **List** as permissions for your SAS token. No other permissions are required.
498+
2. Setting an expiry time no further than seven days into the future.
499+
3. [Restricting IP addresses to only those used by the import process](migration-import-large-collections.md#optional-restrict-access-to-azure-devops-services-ips-only).
500+
4. Placing the SAS token in a secure location.
525501

526502
### Step 5: Complete the import specification
527503

0 commit comments

Comments
 (0)