# Azure Blob Storage

Azure Blob Storage (opens new window) enables you to create data lakes for analytics needs and provides storage for building powerful cloud-native and mobile apps.

Workato's Azure Blob Storage connector allows you to automate cloud storage tasks and build data pipelines that automatically pull or push data to Azure Blob Storage from various apps.

# API version

The Azure Blob Storage connector uses the Blob service REST API (opens new window).

# How to connect to Azure Blob Storage on Workato

You can connect to Azure Blob Storage on Workato by completing the following steps:

1

Create an Integration System User (ISU): Establish an ISU in your Microsoft Entra ID. This ensures that permissions are consistent and all operations are logged on a single account.

2

Choose an authentication type to establish a connection to Workato. Workato supports the following authentication methods:

  • Authorization Code Grant: Use this method for scenarios where Workato performs actions on behalf of a user, leveraging permissions granted to an ISU.

  • Client Credentials Grant: Use this method for service-to-service authentication. This grant type is only available to Tenant-specific connection account types in Workato.

3

Connect to Workato: Follow the setup process to connect Azure Blob Storage to Workato.

# How to create an Integration System User (ISU) for Workato in Microsoft Entra ID

We recommend using an ISU for integration with Workato. This ensures that permissions are consistent and all operations are logged on a single account. Complete the following steps to create an ISU in your Microsoft Entra ID:

PERMISSIONS

The ISU must have access solely to the storage account specified in your Workato connection.

1

Navigate to Microsoft Entra ID.

Navigate to Microsoft Entra ID Access Microsoft Entra ID from your Azure portal

2

Select Add > User > Create new user.

Select new user Create a new user

3

Enter the Identity details for the ISU, such as the User principle name, Display name, and Password.

Fill up new user details Provide details for the new user.

4

To create your ISU, select Review + create > Create.

# Set up an Authorization Code Grant connection for Azure Blob Storage on Workato

You can use an Authorization Code Grant connection type for scenarios where Workato performs actions on behalf of a user, leveraging permissions granted to an ISU. This setup is essential for using Azure Blob Storage's capabilities, including the new event webhook trigger. Complete the following steps to configure your Workato connection through the Azure portal, ensuring your ISU has the appropriate permissions and scopes:

1

In your Azure portal, navigate to Storage accounts.

Navigate to Storage accounts Navigate to Storage accounts from your Azure portal

2

Select your Storage account.

Navigate to specific Storage Account Specify the Storage account to grant access to Workato

3

Navigate to the resource group within your Azure Blob Storage account.

Navigate to specific Storage Account Navigate to the resource group

4

Go to Access Control (IAM) within the resource group.

Navigate to Access Control Navigate to Access Control (IAM)

5

Click Add > Add role assignment to begin assigning roles to the ISU.

Select Add Role Assignment Add a role assignment to the ISU

6

Provision the required roles for the ISU:

  • Storage Blob Data Contributor: Grants full read and write access to Azure Blob Storage.

  • Storage Blob Data Reader: Provides read-only access to Azure Blob Storage.

  • EventGrid Event Subscription Contributor: Enables the ISU to establish and manage event subscriptions within Azure Blob Storage, which is required for using the new event webhook trigger.

7

Ensure the Storage Data Contributor role is active for write access, public network access is available for Workato's IP, and the container access level is set to public.

Set up your Azure Blob Storage connection in Workato:

1

Navigate to Advanced settings > OAuth 2.0 authorization code scopes in your connection setup.

2

Add the Management scope to create webhooks dynamically through the EventGrid API (opens new window). If left blank, default scopes such as Offline_access, Storage, and Management are added.

3

Click Sign in with Microsoft and log in with your ISU credentials.

4

Grant the required permissions to complete the connection setup.

# Set up a Client Credentials Grant connection for Azure Blob Storage

You can establish a connection with Azure Blob Storage using the Client Credentials Grant for service-to-service authentication. Use this grant type for tenant-specific connection account types in Workato. Complete the following steps to setup a Client Credentials Grant connection in Azure Blob Storage:

1

Navigate to App registrations in your Azure portal and select New registration.

Navigate to App registrations Go to App registrations in your Azure portal

2

Enter the Name of the application you plan to register.

Register an application Register an application

3

Choose the Supported account types that can use the application or access the API.

4

Optional. Add a Redirect URI link and enter a URI value. A value is required for most authentication scenarios.

5

Click Register to create the application and view the Overview page.

6

Record the Client ID and Tenant ID for connection setup in Workato.

Record IDs Record IDs

7

Navigate to Manage > API permissions and select Add a permission.

Add a permission Add a permission

8

Select permissions for Azure Storage and Azure Service Management on the Request API permissions page, including user_impersonation.

9

Click Add permissions to grant the permissions.

Grant perrmisions Grant permissions

10

Navigate to Certificates & secrets > Client secrets.

Navigate to Client secrets Navigate to Client secrets

11

Generate a New client secret and record its value.

Generate a Client secret Generate a client secrets

12

Ensure the Client secret is secure.

13

Assign the Storage Blob Data Contributor and EventGrid Event Subscription Contributor roles to the application. This is required to enable full functionality with Azure Blob Storage actions, triggers, and the new event webhook trigger.

14

Set up your Azure Blob Storage connection in Workato.

15

Use the recorded Client ID, Tenant ID, and Client secret to establish a Client Credentials Grant connection.

# Create your Workato connection

Complete the following steps to connect your Workato instance to Azure Blob Storage:

1

Enter a Connection name that uniquely identifies the connection.

2

Provide the name of your Storage account from Azure Blob Storage.

3

Select the Connection account type:

  • Common: Supports personal, enterprise, and multi-tenant accounts that are not tenant-specific.

  • Organization: Supports multi-tenant enterprise accounts.

  • Tenant-specific: Requires you to provide the Tenant ID or Domain.

The default is set to the Common type.

4

Navigate to Advanced settings to manage additional configurations.

5

For an Authorization Code Grant connection, add necessary scopes in OAuth 2.0 authorization code scopes, including Management to create dynamic webhooks through the EventGrid API. If left blank, the Offline_access, Storage, and Management scopes are added.

6

For a Client Credentials Grant connection, add necessary scopes in OAuth 2.0 client credentials scopes, including Management to create dynamic webhooks through the EventGrid API. Ensure that the specified scopes are also defined in your Azure app registration. If left blank, the Storage and Management scopes are added.

7

Enter the Client ID from your Azure portal by navigating to App registrations > Application > Certificates & secrets.

8

Provide the Client secret from the same location.

9

Optional. Enter an Access key for pre-signed URL functionality.

10

Complete the connection setup by clicking Sign in with Microsoft and authorizing the necessary permissions.


Last updated: 5/23/2024, 4:56:16 AM