Infra@UB Firstly, If you have generated a New SAS token for the same azure storage account/blob/container/ share which has SAS token already been generated? The old token gets expired and authentication or authorization won't work. You need to use the newly generated SAS token.
Based on the error: Other authorization errors (for example, attempting to modify an ACL or calling another unsupported SAS API)
- Authorization header is missing, so authorization was acquired using SAS
- Authorization header is present, so authorization was acquired using OAuth Just for the testing purpose, Can you generate the SAS token through Azure Storage explorer tool and let me know the status.
- Cause 2 You can also check your firewall rules for the Storage account
Storage accounts > {yourAccount} > Networking > Firewalls and Virtual networks and add your IP address
Additional information: Can you please refer to this article: How a shared access signature works
Create SAS tokens for your Azure storage
Best practices when using SAS
Additional information :
Request Syntax:
PUT https://myaccount.blob.core.windows.net/mycontainer/myblockblob HTTP/1.1
Request Headers:
x-ms-version: 2015-02-21
x-ms-date: <date>
Content-Type: text/plain; charset=UTF-8
x-ms-blob-content-disposition: attachment; filename="fname.ext"
x-ms-blob-type: BlockBlob
x-ms-meta-m1: v1
x-ms-meta-m2: v2
Authorization: SharedKey myaccount:YhuFJjN4fAR8/AmBrqBz7MG2uFinQ4rkh4dscbj598g=
Content-Length: 11
Request Body:
hello world
https://learn.microsoft.com/en-us/rest/api/storageservices/put-blob
Looking forward for your reply!