Generated on: August 27, 2025 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 4 items
Published: August 26, 2025 17:45:29 UTC Link: Generally Available: Entra ID and RBAC support for GetAccountInfo and other supplemental APIs for Azure Storage
Update ID: 496287 Data source: Azure Updates API
Categories: Launched, Storage, Azure Blob Storage, Security
Summary:
What was updated
Azure Storage now generally supports Entra ID and Role-Based Access Control (RBAC) for several supplemental APIs, including GetAccountInfo, Get/Set Container ACL, Get/Set Queue ACL, and Get/Set Table ACL.
Key changes or new features
These APIs, previously limited in authentication options, can now leverage Entra ID identities and RBAC permissions to enforce fine-grained access control. This enhancement aligns with Azure security best practices by enabling centralized identity management and least-privilege access for storage resource operations.
Target audience affected
Developers and IT professionals managing Azure Storage security and access control will benefit from this update. Those integrating storage APIs into applications or automating storage management can now use Entra ID and RBAC for improved security and compliance.
Important notes if any
Organizations should review and update their access policies to utilize Entra ID and RBAC for these APIs, replacing legacy authentication methods where applicable. This change enhances security posture but may require permission adjustments to ensure uninterrupted access. For detailed implementation guidance, refer to the official Azure documentation linked in the update.
Details:
The recent general availability of Entra ID and Role-Based Access Control (RBAC) support for supplemental Azure Storage APIs—including GetAccountInfo, Get/Set Container ACL, Get/Set Queue ACL, and Get/Set Table ACL—represents a significant enhancement in securing and managing access to Azure Storage resources. This update aligns Azure Storage with modern identity and access management best practices by integrating Azure Active Directory (now Entra ID) authentication and fine-grained RBAC authorization into these previously limited APIs.
Background and Purpose
Historically, many Azure Storage management operations, especially those involving Access Control Lists (ACLs) on containers, queues, and tables, relied on shared keys or SAS tokens for authentication and authorization. While functional, these methods pose security risks such as key leakage and lack of granular permission control. To improve security posture and operational governance, Microsoft has extended Entra ID and RBAC support to supplemental APIs like GetAccountInfo and ACL management operations, enabling centralized identity management, least privilege access, and auditability.
Specific Features and Detailed Changes
GetAccountInfo
: Retrieves properties about the storage account.GetContainerACL
/ SetContainerACL
: Manage access control lists on blob containers.GetQueueACL
/ SetQueueACL
: Manage ACLs on storage queues.GetTableACL
/ SetTableACL
: Manage ACLs on storage tables.Technical Mechanisms and Implementation Methods
Under the hood, when a client calls these supplemental APIs with an OAuth token, Azure Storage validates the token signature and checks the token’s claims against assigned RBAC roles. The RBAC engine evaluates whether the caller has the required permissions to perform the requested operation. This process leverages Azure’s centralized identity platform, allowing consistent enforcement of access policies. The APIs themselves have been updated to accept Authorization headers with bearer tokens and respond with appropriate HTTP status codes (e.g., 403 Forbidden if unauthorized).
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
Published: August 26, 2025 17:00:18 UTC Link: Public Preview: Custom block response code and body for Application Gateway WAF
Update ID: 501323 Data source: Azure Updates API
Categories: In preview, Networking, Security, Application Gateway, Web Application Firewall, Features
Summary:
What was updated
Azure Application Gateway Web Application Firewall (WAF) now supports customizable HTTP response status codes and response bodies for blocked requests, currently in public preview.
Key changes or new features
Developers and IT professionals can configure custom block responses instead of the default 403 Forbidden status and generic message. This allows tailoring the response code and content to better align with application requirements, improve user experience, or integrate with monitoring and automation workflows.
Target audience affected
This update primarily benefits developers managing web applications behind Azure Application Gateway WAF and IT security teams responsible for configuring and maintaining WAF policies.
Important notes if any
The feature is in public preview, so it should be used with caution in production environments. Users need to explicitly enable and configure custom block responses via WAF policy settings. This enhancement improves flexibility in handling blocked traffic but does not change the underlying blocking logic or security posture of the WAF.
For more details and configuration guidance, refer to the official Azure update: https://azure.microsoft.com/updates?id=501323
Details:
The recent public preview announcement for Azure Application Gateway Web Application Firewall (WAF) introduces the capability to customize the HTTP response status code and response body returned when a request is blocked by the WAF. This enhancement addresses a key operational need for organizations to tailor security responses to align with their application behavior, user experience, and compliance requirements.
Background and Purpose
Azure Application Gateway WAF protects web applications from common threats and vulnerabilities by inspecting incoming HTTP/HTTPS traffic and blocking malicious requests based on OWASP core rule sets and custom rules. Previously, when the WAF blocked a request, it returned a fixed HTTP 403 Forbidden status code with a generic response body. While effective for security, this default behavior limited flexibility in how applications handle blocked requests, potentially impacting user experience or integration with custom monitoring and logging systems. The update aims to provide IT professionals and developers with greater control over the WAF’s blocking responses, enabling them to customize both the HTTP status code and the response body content.
Specific Features and Detailed Changes
Technical Mechanisms and Implementation Methods
The customization is implemented through the Azure portal, Azure CLI, or ARM templates by modifying the WAF policy’s custom block response settings. When a request triggers a WAF rule and is blocked, the Application Gateway intercepts the response generation process and substitutes the default 403 status code and body with the user-defined values. This substitution occurs before the response is sent back to the client, ensuring seamless integration with existing traffic flow. The feature supports both Prevention mode (blocking) and Detection mode (logging only) configurations, but the custom response applies only when blocking is active.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
Published: August 26, 2025 16:00:15 UTC Link: Generally Available: CNI Overlay for Application Gateway for Containers and AGIC
Update ID: 500991 Data source: Azure Updates API
Categories: Launched, Networking, Security, Application Gateway, Services, Features
Summary:
What was updated
Azure CNI Overlay support for Application Gateway for Containers (AGIC) is now generally available.
Key changes or new features
The Azure CNI Overlay allows AKS clusters to assign pod IPs from a separate CIDR block distinct from the VNet IP space. This conserves IP address space within the VNet and simplifies networking for multi-cluster deployments. When combined with AGIC, it enables seamless ingress traffic management using Application Gateway while maintaining efficient IP utilization and network isolation.
Target audience affected
Developers and IT professionals managing AKS clusters with Application Gateway ingress, especially those dealing with IP address constraints or multi-cluster networking scenarios.
Important notes if any
This GA release ensures production-ready stability and support. Users should plan network CIDR allocations accordingly to leverage the overlay benefits. Integration with AGIC requires configuration updates to support the overlay networking model. This feature helps optimize IP usage and simplifies complex cluster networking architectures.
For more details, refer to the official Azure update: https://azure.microsoft.com/updates?id=500991
Details:
The Azure update announcing the general availability of the CNI Overlay for Application Gateway for Containers (AGIC) introduces a significant enhancement to networking in Azure Kubernetes Service (AKS) environments, particularly for scenarios involving Application Gateway as an ingress controller.
Background and Purpose
Traditionally, AKS clusters using Azure CNI allocate pod IP addresses directly from the cluster’s virtual network (VNet) subnet, which can rapidly consume IP address space in large or multi-cluster deployments. This limitation complicates network management and scaling, especially when integrating with Application Gateway for Containers (AGIC), which requires stable and scalable ingress networking. The CNI Overlay addresses these challenges by decoupling pod IP allocation from the VNet subnet, enabling more efficient IP space utilization and simplified multi-cluster networking.
Specific Features and Detailed Changes
The key feature of this update is the introduction of an overlay network for Azure CNI that allows pods to receive IP addresses from a dedicated CIDR block separate from the VNet subnet. This overlay network is implemented on top of the existing Azure CNI, preserving native network performance and compatibility with Azure networking features. When combined with AGIC, this overlay enables Application Gateway to route traffic to pods using these overlay IPs seamlessly, without requiring additional complex routing or NAT configurations.
Technical Mechanisms and Implementation Methods
The CNI Overlay leverages encapsulation techniques to route pod traffic from the overlay CIDR to the underlying VNet. Essentially, pods are assigned IPs from the overlay CIDR, and their traffic is encapsulated and tunneled through the VNet to reach other resources or ingress points. This encapsulation is transparent to the pods and the Application Gateway, which continues to operate using standard IP routing semantics. Deployment involves configuring the AKS cluster to enable the overlay mode during cluster creation or upgrade, specifying the overlay CIDR range, and integrating AGIC to recognize and route traffic to overlay IPs.
Use Cases and Application Scenarios
This update is particularly beneficial for organizations managing multiple AKS clusters within a single VNet or across VNets with peering, where IP address conservation is critical. It simplifies multi-cluster ingress architectures by allowing AGIC to manage traffic across clusters without IP conflicts or complex network topologies. Additionally, it supports large-scale AKS deployments where the native Azure CNI IP allocation would otherwise exhaust subnet capacity. Use cases include microservices architectures requiring scalable ingress, hybrid cloud scenarios with interconnected clusters, and environments demanding strict IP management and security segmentation.
Important Considerations and Limitations
While the overlay network provides IP space efficiency, it introduces an additional encapsulation layer, which may have minor performance implications compared to native Azure CNI pod IPs. Network troubleshooting may require familiarity with overlay networking concepts and tools. Also, existing network policies and security groups must be reviewed to ensure compatibility with overlay IP ranges. The feature requires AKS clusters to be on supported Kubernetes versions and may necessitate cluster upgrades or reconfiguration. It is essential to plan the overlay CIDR carefully to avoid overlaps with existing network ranges.
Integration with Related Azure Services
The CNI Overlay integrates tightly with Application Gateway for Containers (AGIC), enabling seamless ingress traffic management using overlay pod IPs. It also works in conjunction with Azure Virtual Network, Azure Network Policies, and Azure Monitor for comprehensive network management and observability. This update complements Azure Arc-enabled Kubernetes by facilitating consistent networking across hybrid and multi-cloud clusters. Additionally, it supports Azure Policy enforcement for network configurations and can be combined with Azure Firewall or Network Virtual Appliances for enhanced security.
In summary, the general availability of Azure CNI Overlay for Application Gateway for Containers and AGIC provides a robust solution to optimize IP address utilization and simplify ingress networking in AKS, enabling scalable, multi-cluster deployments with efficient and manageable network architectures.
Published: August 26, 2025 16:00:15 UTC Link: Public Preview: Azure NetApp Files short-term clones
Update ID: 500914 Data source: Azure Updates API
Categories: In preview, Storage, Azure NetApp Files, Features, Services, SDK and Tools
Summary:
What was updated
Azure NetApp Files now offers short-term clones in public preview.
Key changes or new features
Short-term clones provide instant, space-efficient read/write access by creating temporary thin clones from existing volume snapshots. This eliminates the need for full data duplication, significantly reducing storage consumption and accelerating data provisioning. Clones are ideal for scenarios requiring rapid, temporary data copies such as software development, testing, and data analytics workflows.
Target audience affected
Developers, DevOps engineers, and IT professionals managing storage and application environments that require fast, ephemeral data copies will benefit from this feature. It is particularly useful for teams needing quick environment spin-ups without incurring high storage costs.
Important notes if any
This feature is currently in public preview, so users should evaluate it in non-production environments and provide feedback. Integration with existing Azure NetApp Files snapshots is required, and there may be limitations on clone lifespan or performance during preview. Check the official documentation for detailed usage guidelines and regional availability.
Details:
The recent public preview of Azure NetApp Files short-term clones introduces a significant enhancement aimed at optimizing storage efficiency and accelerating data access workflows by enabling the creation of temporary, space-efficient writable clones derived from existing volume snapshots. This feature addresses the common challenge of provisioning full data copies for development, testing, or data analysis scenarios, which traditionally consume substantial storage capacity and time.
Background and Purpose
Azure NetApp Files (ANF) is a high-performance, enterprise-grade file storage service designed for demanding workloads requiring low latency and high throughput. Prior to this update, creating writable clones typically involved full volume copies or long-term clones, which consume considerable storage and take time to provision. The short-term clones feature was introduced to provide instant, space-efficient writable copies that leverage snapshot technology, thereby reducing storage overhead and accelerating deployment cycles for ephemeral workloads.
Specific Features and Detailed Changes
Technical Mechanisms and Implementation Methods
Short-term clones utilize the underlying snapshot technology of Azure NetApp Files. When a clone is created, it references the snapshot metadata, sharing the same physical storage blocks initially. As changes occur on the clone, copy-on-write mechanisms allocate new storage blocks for modified data, preserving the original snapshot state. This approach minimizes storage consumption and accelerates clone creation. The lifecycle management is integrated into the ANF control plane, allowing users to specify retention periods and automate cleanup. The clones are managed via Azure CLI, REST API, and Azure Portal, providing flexibility in automation and integration.
Use Cases and Application Scenarios
Important Considerations and Limitations
Integration with Related Azure Services
Short-term clones integrate seamlessly with Azure NetApp Files’ existing ecosystem and management tools, including Azure Portal, Azure CLI, and REST APIs, facilitating automation and orchestration. They complement Azure DevOps pipelines by enabling rapid environment provisioning. Additionally, these clones can be used alongside Azure Kubernetes Service (AKS) for stateful application testing, and with Azure Monitor for performance and usage tracking. Integration with Azure Policy can help enforce governance on clone creation and retention.
In summary, Azure NetApp Files short-term clones provide IT professionals with a powerful tool to create instant, writable, and space-efficient data copies from snapshots, optimizing storage utilization and accelerating workflows in
This report was automatically generated - 2025-08-27 03:02:18 UTC