# Azure Blob Storage

Azure Blob Storage (opens new window) enables you to create data lakes for analytics and provides storage for building powerful cloud-native and mobile apps.

Azure Blob Storage enables you to store large amounts of unstructured object data. All Azure Blob Storage data is stored within containers. You must create a storage container before you can upload data with your Workato connection.

CONTAINERS ARE REQUIRED

Log streams stop and Workato sends a notification email if you delete a container.

Workato's Azure Blob Storage connector allows you to automate cloud storage tasks and build data pipelines that automatically pull or push data to Azure Blob Storage from various apps.

# API version

The Azure Blob Storage connector uses the Blob service REST API (opens new window).

# How to connect to Azure Blob Storage on Workato

There are two ways to authenticate to Azure Blob Storage:

# Create an Authorization Code Grant and Integration System User

Use an Authorization Code Grant connection to allow Workato to perform actions on behalf of a user by leveraging Integration System User (ISU) permissions. This setup is required to use Azure Blob Storage's capabilities, including the event webhook trigger.

Complete the following steps to create an ISU in your Microsoft Entra ID account:

ISU ACCOUNT ACCESS

The ISU must have access solely to the storage account specified in your Workato connection.

Complete the following steps to create an ISU in your Microsoft Entra ID account:

1

Go to Microsoft Entra ID.

Go to Microsoft Entra ID Access Microsoft Entra ID from your Azure portal

2

Select Add > User > Create new user.

Select new user Create a new user

3

Enter the Identity details for the ISU, such as the User principle name, Display name, and Password.

Fill in new user details Provide details for the new user.

4

Select Review + create > Create to create your ISU.

# Configure the ISU

Complete the following steps to configure your Workato connection through the Azure portal, ensuring that your ISU has the appropriate permissions and scopes:

1

In your Azure portal, go to Storage accounts.

Go to storage accounts Navigate to Storage accounts from your Azure portal

2

Select your Storage account.

Go to specific Storage Account Specify the Storage account to grant access to Workato

3

Select the resource group within your Azure Blob Storage account.

Navigate to specific Storage Account Navigate to the resource group

4

Go to Access Control (IAM) within the resource group.

Navigate to Access Control Navigate to Access Control (IAM)

5

Click Add > Add role assignment to begin assigning roles to the ISU.

Select Add Role Assignment Add a role assignment to the ISU

6

Provision the required roles for the ISU:

  • Storage Blob Data Contributor: Grants full read and write access to Azure Blob Storage.

  • Storage Blob Data Reader: Provides read-only access to Azure Blob Storage.

  • EventGrid Event Subscription Contributor: Enables the ISU to establish and manage event subscriptions within Azure Blob Storage. This is required for using the new event webhook trigger.

7

Ensure that the Storage Data Contributor role is active for write access, public network access is available for Workato's IP, and the container access level is set to public.

# Create a Client Credentials Grant

You can use a Client Credentials Grant to establish a connection with Azure Blob Storage. Use this grant type for:

  • Working with tenant-specific connection account types, which are the only supported account type for this grant.
  • Service-to-service authentication, where you access Azure with managed identities.

Complete the following steps to set up a Client Credentials Grant connection in Azure Blob Storage:

1

Go to App registrations in your Azure portal.

Navigate to App registrations Go to App registrations in your Azure portal

2

Select New registration.

3

Enter the Name of the application you plan to register.

Register an application Register an application

4

Select the Supported account types to allow to use the application and access the API.

5

Optional. Enter https://www.workato.com/oauth/callback as the Redirect URI.

6

Click Register to create the application and view the Overview page.

7

Record the Client ID and Tenant ID for connection setup in Workato.

Record IDs Record IDs

8

Go to Manage > API permissions.

9

Select Add a permission.

Add a permission Add a permission

10

Select permissions for Azure Storage and Azure Service Management on the Request API permissions page, including user_impersonation.

11

Click Add permissions to grant the permissions.

Grant perrmisions Grant permissions

12

Go to Certificates & secrets > Client secrets.

Navigate to Client secrets Navigate to Client secrets

13

Generate a New client secret and securely record its Secret ID.

Generate a Client secret Generate a client secrets

14

Assign the Storage Blob Data Contributor and EventGrid Event Subscription Contributor roles to the application. This is required to enable full functionality with Azure Blob Storage actions, triggers, and the new event webhook trigger.

15

Use the recorded Client ID, Tenant ID, and Client secret to establish a Client Credentials Grant connection.

Continue to set up your Azure Blob Storage connection in Workato.

# Complete setup in Workato

Complete the following steps to connect to Azure Blob Storage in Workato:

1

Click Create > Connection.

2

Search for and select the Azure Blob Storage as your connection on the New connection page.

3

Enter a Connection name that uniquely identifies the connection.

4

Select the project where you plan to store the connection from the Location drop-down menu.

5

Enter the name of your Storage account from Azure Blob Storage.

6

Select the Connection account type:

  • Common: Supports personal, enterprise, and multi-tenant accounts that are not tenant-specific.

  • Organization: Supports multi-tenant enterprise accounts.

  • Tenant-specific: Requires you to provide the Tenant ID or Domain.

The default is the Common type.

7

Go to Advanced settings to manage additional configurations.

8
9

Enter the Client ID from your Azure portal.

10

Enter the Client secret from Certificates & secrets in the Azure portal.

11

Optional. Enter an Access key for pre-signed URL functionality.

12

Click Sign in with Microsoft.

13

Authorize the necessary permissions when prompted to complete the connection setup.


Last updated: 6/5/2025, 5:06:40 PM