DailyAzureUpdatesGenerator

January 17, 2026 - Azure Updates Summary Report (Details Mode)

Generated on: January 17, 2026 Target period: Within the last 24 hours Processing mode: Details Mode Number of updates: 1 items

Update List

1. Public Preview: User delegation SAS for Azure Tables, Azure Files, and Azure Queues

Published: January 16, 2026 17:00:49 UTC Link: Public Preview: User delegation SAS for Azure Tables, Azure Files, and Azure Queues

Update ID: 548987 Data source: Azure Updates API

Categories: In preview, Storage, Databases, Azure Files, Queue Storage, Table Storage

Summary:

Details:

The recent Azure update announces the public preview availability of User Delegation Shared Access Signatures (SAS) for Azure Tables, Azure Files, and Azure Queues, extending the existing User Delegation SAS support previously limited to Azure Blob storage. This enhancement enables more secure, flexible, and manageable delegated access to these additional storage services by leveraging Azure Active Directory (Azure AD) credentials.

Background and Purpose
Shared Access Signatures (SAS) provide delegated, time-bound, and permission-scoped access to Azure Storage resources without exposing the account key. Traditionally, SAS tokens were either account SAS or service SAS, both relying on storage account keys, which pose security risks if keys are compromised. User Delegation SAS (UDSAS) improves security by using Azure AD credentials to generate SAS tokens, thereby enabling fine-grained access control aligned with organizational identity and access management policies. Until now, UDSAS was only available for Blob storage. This update addresses the need for consistent, secure delegated access across other storage services—Tables, Files, and Queues—facilitating unified security models and improved compliance.

Specific Features and Detailed Changes

Technical Mechanisms and Implementation Methods
User Delegation SAS relies on Azure AD OAuth 2.0 tokens to authenticate the user or service principal requesting the SAS. The process involves:

  1. Authentication: The client authenticates to Azure AD and obtains an OAuth 2.0 access token with appropriate permissions to the storage account.
  2. User Delegation Key Request: Using the access token, the client requests a user delegation key from the Azure Storage service. This key is scoped to the authenticated identity and has a validity period.
  3. SAS Token Generation: The client uses the user delegation key to cryptographically sign the SAS token, specifying permissions, resource types, and expiry.
  4. Resource Access: The SAS token is then used by clients or applications to access the specified storage resources without needing the account key.

This mechanism leverages Azure AD’s centralized identity management and conditional access policies, enhancing security and auditability.

Use Cases and Application Scenarios

Important Considerations and Limitations


This report was automatically generated - 2026-01-17 03:01:20 UTC