An Azure service that provides fine-grained access management for Azure resources, enabling you to grant users only the rights they need to perform their jobs.
Hello Luke Rosser
It sounds like you’re trying to give users just enough access in the Azure Portal to list and download/upload blobs—without letting them poke around the networking settings, IAM “Check access” pane, or any other control-plane blades. Unfortunately, the Portal surface itself doesn’t let you hide those blades via Policy or Conditional Access; it simply shows you whatever resource-level read permissions you have on a storage account. Here’s the scoop and a pattern you can use today:
- Don’t grant any control-plane “read” rights on the storage account • Your custom role currently includes “Microsoft.Storage/storageAccounts/read” That single read right is what enables the Portal to show the Overview, Networking, Configuration, IAM, etc. • Remove that action from your role. If you strip out all
storageAccounts/*control-plane actions (and anything underMicrosoft.Authorization/*), Azure Portal will no longer render those blades. - Use a data-plane only role (built-in or custom) scoped at the storage account (or container) level • The built-in Storage Blob Data Reader role gives users List + Read on containers/blobs. • If they need upload/delete, go with Storage Blob Data Contributor. • Neither of those roles include the control-plane actions, so the Portal only renders the blob browser UI. • You can scope it to the whole account (so they see every container) or even a single container (if that fits your segregation needs).
- What about “Check access”? That link in the IAM blade calls
Microsoft.Authorization/permissions/readand roleAssignments list APIs. By not granting any Microsoft.Authorization or Microsoft.Storage/storageAccounts/read rights, that blade simply won’t appear. - Azure Policy and Conditional Access won’t hide Portal blades • Azure Policy is for enforcing resource properties (firewall rules, SKUs, tags, etc.), not UI. • Conditional Access controls/auth methods to sign in—it can’t turn off a Portal menu.
In short, to get the “blob-only” experience in the Portal, give them only data-plane RBAC (Storage Blob Data Reader/Contributor) and remove all control-plane actions from your custom role. That way the Portal won’t show Networking, IAM “Check access,” Configuration, etc., but will let them browse and manage blobs.
Check the reference document:
https://learn.microsoft.com/en-us/azure/storage/blobs/authorize-data-operations-portal
I hope the above answer helps you! Please let us know if you have any further questions.
Please don't forget to "upvote" where the information provided will help you, this can be beneficial to other members of the community.