ईवेंट्स
17 मार्च, 9 pm - 21 मार्च, 10 am
साथी डेवलपर्स और विशेषज्ञों के साथ वास्तविक दुनिया के उपयोग के मामलों के आधार पर स्केलेबल एआई समाधान बनाने के लिए मीटअप श्रृंखला में शामिल हों।
अभी पंजीकरण करेंयह ब्राउज़र अब समर्थित नहीं है.
नवीनतम सुविधाओं, सुरक्षा अपडेट और तकनीकी सहायता का लाभ लेने के लिए Microsoft Edge में अपग्रेड करें.
Encrypting your function app's application data at rest requires an Azure Storage Account and an Azure Key Vault. These services are used when you run your app from a deployment package.
First, create an Azure Storage account and encrypt it with customer managed keys. Once the storage account is created, use the Azure Storage Explorer to upload package files.
Next, use the Storage Explorer to generate an SAS.
नोट
Save this SAS URL, this is used later to enable secure access of the deployment package at runtime.
Once you upload your file to Blob storage and have an SAS URL for the file, set the WEBSITE_RUN_FROM_PACKAGE
application setting to the SAS URL. The following example does it by using Azure CLI:
az webapp config appsettings set --name <app-name> --resource-group <resource-group-name> --settings WEBSITE_RUN_FROM_PACKAGE="<your-SAS-URL>"
Adding this application setting causes your function app to restart. After the app has restarted, browse to it and make sure that the app has started correctly using the deployment package. If the application didn't start correctly, see the Run from package troubleshooting guide.
Now you can replace the value of the WEBSITE_RUN_FROM_PACKAGE
application setting with a Key Vault reference to the SAS-encoded URL. This keeps the SAS URL encrypted in Key Vault, which provides an extra layer of security.
Use the following az keyvault create
command to create a Key Vault instance.
az keyvault create --name "Contoso-Vault" --resource-group <group-name> --location eastus
Follow these instructions to grant your app access to your key vault:
Use the following az keyvault secret set
command to add your external URL as a secret in your key vault:
az keyvault secret set --vault-name "Contoso-Vault" --name "external-url" --value "<SAS-URL>"
Use the following az webapp config appsettings set
command to create the WEBSITE_RUN_FROM_PACKAGE
application setting with the value as a Key Vault reference to the external URL:
az webapp config appsettings set --settings WEBSITE_RUN_FROM_PACKAGE="@Microsoft.KeyVault(SecretUri=https://Contoso-Vault.vault.azure.net/secrets/external-url/<secret-version>"
The <secret-version>
will be in the output of the previous az keyvault secret set
command.
Updating this application setting causes your function app to restart. After the app has restarted, browse to it make sure it has started correctly using the Key Vault reference.
It is best practice to periodically rotate the SAS key of your storage account. To ensure the function app does not inadvertently lose access, you must also update the SAS URL in Key Vault.
Rotate the SAS key by navigating to your storage account in the Azure portal. Under Settings > Access keys, select the icon to rotate the SAS key.
Copy the new SAS URL, and use the following command to set the updated SAS URL in your key vault:
az keyvault secret set --vault-name "Contoso-Vault" --name "external-url" --value "<SAS-URL>"
Update the key vault reference in your application setting to the new secret version:
az webapp config appsettings set --settings WEBSITE_RUN_FROM_PACKAGE="@Microsoft.KeyVault(SecretUri=https://Contoso-Vault.vault.azure.net/secrets/external-url/<secret-version>"
The <secret-version>
will be in the output of the previous az keyvault secret set
command.
There are two methods to revoke the function app's access to the storage account.
If the SAS key for the storage account is rotated, the function app will no longer have access to the storage account, but it will continue to run with the last downloaded version of the package file. Restart the function app to clear the last downloaded version.
You can revoke the function app's access to the site data by disabling the function app's access to Key Vault. To do this, remove the access policy for the function app's identity. This is the same identity you created earlier while configuring key vault references.
Your application files are now encrypted at rest in your storage account. When your function app starts, it retrieves the SAS URL from your key vault. Finally, the function app loads the application files from the storage account.
If you need to revoke the function app's access to your storage account, you can either revoke access to the key vault or rotate the storage account keys, both of which invalidate the SAS URL.
Only the cost associated with the Azure Storage Account and any applicable egress charges.
wwwroot/
read-only. Your app receives an error when it attempts to write to this directory.ईवेंट्स
17 मार्च, 9 pm - 21 मार्च, 10 am
साथी डेवलपर्स और विशेषज्ञों के साथ वास्तविक दुनिया के उपयोग के मामलों के आधार पर स्केलेबल एआई समाधान बनाने के लिए मीटअप श्रृंखला में शामिल हों।
अभी पंजीकरण करेंप्रशिक्षण
मॉड्यूल
अपना Azure संग्रहण खाता सुरक्षित करें - Training
जानें कि Azure संग्रहण आपके डेटा को पहुँच कुंजियों, सुरक्षित नेटवर्क्स और उन्नत ख़तरा सुरक्षा निगरानी से सुरक्षित करने के लिए बहुस्तरीय सुरक्षा कैसे प्रदान करता है.
Certification
Microsoft प्रमाणित: Azure डेवलपर सहयोगी - Certifications
Azure फ़ंक्शन बनाने, वेब ऐप्स को लागू करने और प्रबंधित करने, Azure संग्रहण का उपयोग करके समाधान विकसित करने, और बहुत कुछ करने के लिए Microsoft Azure में एंड-टू-एंड समाधान बनाएँ।
दस्तावेज़ीकरण
Learn about how to make your function code running in Azure more secure from common attacks.
Work with access keys in Azure Functions
Learn about access keys in Azure Functions, including how to get and renew keys and how to use access keys when calling function endpoints.
Use Key Vault references - Azure App Service
Learn how to set up Azure App Service and Azure Functions to use Azure Key Vault references. Make Key Vault secrets available to your application code.