-
Notifications
You must be signed in to change notification settings - Fork 222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make use of Azure CLI environment variables #1833
Comments
Hi @webcompas, thanks for reaching out! Would it be possible for you to use AAD(Azure Active Directory) instead? In other words, perform |
Can we use AAD with file share ? I know it work with Blob, AAD + file share is not supported to my knowledge... ?? |
@aleblanc70 AAD support for Azure Files is forthcoming. I can't give an exact ETA, but it should be soon. |
Unfortunately I'm not that much familiar with AAD. But since this kind of authentication (SAS) is also used with similar storage services it would make it easier to interact with multiple of them. |
Which version of the AzCopy was used?
10.15.0
Which platform are you using? (ex: Windows, Mac, Linux)
Linux
What command did you run?
azcopy sync
What problem was encountered?
Since the command line contains the SAS token it is readable for everyone who can look into the system's process list. Of course there are options to prevent users from seeing other users' processes. But on systems managed by third-parties this isn't possible.
How can we reproduce the problem in the simplest way?
Just run an
azcopy sync
job and look into the process list.Have you found a mitigation/solution?
The best solution would be to optionally make use of the Azure CLI's environment variable AZURE_STORAGE_SAS_TOKEN. This also applies to other environment variables like AZURE_STORAGE_ACCOUNT or AZURE_STORAGE_SERVICE_ENDPOINT.
The text was updated successfully, but these errors were encountered: