You can use these credentials to authenticate the following nodes:
Prerequisites
Supported authentication methods
Refer to Azure Storage’s API documentation for more information about the service.
Using OAuth2
For self-hosted users, there are two main steps to configure OAuth2 from scratch:
- Register an application with the Microsoft Identity Platform.
- Generate a client secret for that application.
Follow the detailed instructions for each step below. For more detail on the Microsoft OAuth2 web flow, refer to Microsoft authentication and authorization basics.
Register an application
Register an application with the Microsoft Identity Platform:
- Open the Microsoft Application Registration Portal.
- Select Register an application.
- Enter a Name for your app.
- In Supported account types, select Accounts in any organizational directory (Any Azure AD directory - Multi-tenant) and personal Microsoft accounts (for example, Skype, Xbox).
- In Register an application:
- Copy the OAuth Callback URL from your credential.
- Paste it into the Redirect URI (optional) field.
- Select Select a platform > Web.
- Select Register to finish creating your application.
- Copy the Application (client) ID and paste it as the Client ID.
Refer to Register an application with the Microsoft Identity Platform for more information.
Generate a client secret
With your application created, generate a client secret for it:
- On your Microsoft application page, select Certificates & secrets in the left navigation.
- In Client secrets, select + New client secret.
- Enter a Description for your client secret.
- Select Add.
- Copy the Secret in the Value column.
- Paste it as the Client Secret.
- Select Connect my account to finish setting up the connection.
- Log in to your Microsoft account and allow the app to access your info.
Refer to Microsoft’s Add credentials for more information on adding a client secret.
Using Shared Key
To configure this credential, you’ll need:
- An Account: The name of your Azure Storage account.
- A Key: A shared key for your Azure Storage account. Select Security + networking and then Access keys. You can use either of the two account keys for this purpose.
Refer to Manage storage account access keys | Microsoft for more detailed steps.
Common issues
Here are the known common errors and issues with Azure Storage credentials.
Need admin approval
When attempting to add credentials for a Microsoft360 or Microsoft Entra account, users may see a message when following the procedure that this action requires admin approval.
This message will appear when the account attempting to grant permissions for the credential is managed by a Microsoft Entra. In order to issue the credential, the administrator account needs to grant permission to the user (or “tenant”) for that application.
The procedure for this is covered in the Microsoft Entra documentation.
Responses are generated using AI and may contain mistakes.