Skip to main content
Feedback

Azure Blob Storage as a Target connection

Overview

Once you have a valid SAS token, the next step is to configure the Azure Blob Storage connection in Data Integration.
This setup allows Data Integration to authenticate securely and write data to your Azure container as part of your data pipeline.

Data Integration must establish a target connection to Azure Blob Storage to transfer data during process execution.
Using a Shared Access Signature (SAS) token ensures secure, scoped, and time-bound access — allowing Data Integration to write data without exposing full account keys.

Configuring connection in Data Integration

  1. Navigate to the Target tab in your Source to Target River. A list of supported Targets appear.
  2. Select Azure Blob Storage.
  3. Enter the Account Name associated with your Azure Storage account.
  4. (Optional) Enter the Account Key if using key-based authentication.
  5. (Optional) Enter the SAS Token (starting with ?sv=) if using SAS-based authentication.
  6. Click Test Connection to verify access to your Azure Blob Storage.
  7. Once the test succeeds, click Save to store the connection.
note

You can connect using either an Account Key or an SAS Token, or combine both for enhanced security.
To create an SAS Token, refer to Azure Blob Storage as a Target).

Verify and test

  1. Run a small process that writes a test file. For example, healthcheck.txt.
  2. Verify that the file appears in the container and path you configured. For example, quick self-test via HTTP
# List blobs (requires 'l' permission)
curl "https://<acct>.blob.core.windows.net/<container>?restype=container&comp=list&<SAS>"

# Upload a small file as Block Blob (requires 'c','w' permissions)
printf 'ok' > healthcheck.txt
curl -X PUT \
-H "x-ms-blob-type: BlockBlob" \
--data-binary @healthcheck.txt \
"https://<acct>.blob.core.windows.net/<container>/test/healthcheck.txt?<SAS>"

Troubleshooting

SymptomLikely CauseResolution
AuthorizationFailure during uploadMissing o in Account SAS srt (needs sco)Regenerate Account SAS with srt=sco
403 on uploadMissing c or w permissionsRegenerate SAS with c,w (and l if listing)
Cannot list blobs / validation failsMissing l or incorrect scopeAdd l and ensure the SAS scope covers the target container
Token rejected / Not yet validst set in the future (UTC)Set st ~15 minutes in the past
Works in Portal but not from runtimesip (IP) restriction mismatchRemove sip or align runtime egress IPs
Files land in unexpected pathIncorrect folder/path in operationReview and correct the blob path in the operation

Security guidance

  • Keep SAS tokens short-lived and rotate them regularly.
  • Store SAS tokens securely in a secret manager; avoid plaintext storage.
  • Enforce HTTPS-only access and apply IP restrictions where feasible.
  • Prefer the narrowest scope required — for single-container targets, use a Container SAS.
On this Page