Is there a way to use a Managed Identity (either System or User-assigned) for authenticating a Function and Storage Account?
Example
- In a Python Azure Function's
function.json
file, there is abindings
object:
"bindings": [
{
"name": "msg",
"type": "queueTrigger",
"direction": "in",
"queueName": "<my-queue-name>",
"connection": "CONN_STRING"
}
]
- The
connection
parameter refers to avalue
inlocal.settings.json
when run locally OR anApp Setting
when deployed to Azure. - These can be either hardcoded in these areas or use a Key Vault Secret Reference
Question:
- Instead of using a Connection String (whether KV Reference or not), can I can grant the Functions Managed Identity a
Storage Queue Contributor
RBAC role? - I don't want to handle these Connection Strings
Is this possible? If so, what value do I put in the connection
parameter?
Instead of passing the Storage Account's connection string, you can achieve the same with an Identity-Based connection. Refer MSDOC:
You can use
AzureWebJobsStorage__queueServiceUri
setting to achieve your requirement.Storage Queue Data Contributor
role.Storage Queue Data Reader
andStorage Queue Data Message Processor
roles in the Storage Account.local.setting.json
AzureWebJobsStorage__accountName
to the name of the your storage account as its value.local.settings.json:
function_app.py:
Local Response:
Updated Solution:
To use an identity-based connection to a Storage Account which is not the AzureWebJobsStorage Account, assign the storage account as value to any new variable with pattern
"<CONNECTION_NAME_PREFIX>__queueServiceUri": "https://<storage_account_name>.queue.core.windows.net"
local.settings.json:
Code Snippet:
Change the connection value in the
functionapp.py
asconnection =<CONNECTION_NAME_PREFIX>
.