You can secure your storage account to a specific set of supported networks. For this, you have to configure network rules so that only applications that request data over the specific set of networks can access the storage account. When these network rules are effective, the application needs to use proper authorization on the request. This authorization can be provided by Azure Active Directory credentials for blobs and queues, with an SAS token or a valid account access key.
In the following demonstration, we are going to configure network access to the storage account that we created in the previous step. You can manage storage accounts through the Azure portal, PowerShell, or CLIv2. We are going to set this configuration from the Azure portal. Therefore, we have to perform the following steps:
- Navigate to the Azure portal...