Skip to content

Set up the Microsoft Azure Data Lake Storage Environment

To work with the Microsoft Azure Storage connector, you need to have a Microsoft Azure account. If you do not have a Microsoft Azure account, you are prompted to create one when you sign up.

Sign Up for Microsoft Azure

To sign up for Microsoft Azure:

  1. Navigate to Microsoft Azure and create a Microsoft Azure account using Try Azure for free button.

  2. Follow the online instructions.

Part of the sign-up procedure involves receiving a phone call and entering a verification code using the phone keypad. Microsoft Azure will notify you by email when your account is active and available for you to use.

Create Microsoft Azure Storage account

Follow the steps below to obtain the access credentials from Microsoft Azure Storage account.

  1. Go to Microsoft Azure Portal, and sign in to the created Microsoft Azure account. On the Azure portal menu, Type Storage Accounts. As you begin typing, the list filters based on your input. Select Storage Accounts.
    MS Azure Home Page

  2. Go to the dashboard and click Storage accounts then click Create and fill the required details to create a new storage account.

    Select MS Azure storage account

  3. Select the subscription in which to create the storage account.

    MS azure storage basic configurations

  4. Under the Resource group field, select Create new. Enter a name for your new resource group.

    Create resource group

  5. Enter a name for your storage account.

  6. Select a location for your storage account, or use the default location.

  7. Select Azure Blobs Storage or Azure Data Lake Storage Gen2 as primary service.

    Add primary service

  8. Leave other fields set to their default values.

  9. Click the Next button to go the advanced options.

    Review and create

  10. Enable hierarchical namespace.

    Enable hierarchical namespace

  11. Leave other fields set to their default values.

  12. Select Review + Create to review your storage account settings and create the account.

    Review and create

  13. Click Create button.

    Review and create

Obtaining the Access Key

Note

If you are planning to use Client credentials for authentication, skip this and check Obtaining the Client credentials

Note

If you are planning to use Shared Access Signature(SAS) for authentication, skip this and check Obtaining the Shared Access Signature (SAS) Token

  1. Navigate to the created storage account and click it.

    Select created storage account

  2. Click Access keys under Security + networking.

  3. Obtain the access key.

    Copy access keys

Obtaining the Shared Access Signature (SAS) Token

Note

If you are planning to use Client credentials for authentication, skip this and check Obtaining the Client credentials

Note

If you are planning to use Access key for authentication, skip this and check Obtaining the Access Key

  1. Navigate to the created storage account and click it.

  2. Click Shared access signature under Security + networking.

  3. Select the required permissions, services, and expiration time.

    Copy access keys

  4. Click Generate SAS and connection string.

    Copy sas keys

  5. Copy the SAS token and use it for authentication.

Obtaining the Client credentials

Note

If you are planning to use Access key for authentication, skip this and check Obtaining the access credentials

Note

If you are planning to use Shared Access Signature(SAS) for authentication, skip this and check Obtaining the Shared Access Signature (SAS) Token

  1. Create an Azure Active Directory application and service principal. For more information refer Create an Azure Active Directory application.

    Azure Active Directory

  2. Go to App Registrations. Click on the created app registration. Obtain the Client ID, client and Tenant ID. Click on Client Credentials and obtain Secret ID. For more information refer Create a new application secret and Active Directory tenant ID.

    App Registrations

    App Registrations

  3. Assign an Azure role for access to blob data. For more information refer Assign an Azure role and Assign an Azure role for access to blob data.

Note: Azure Storage Account does not support HTTP requests. If you are using a storage key to access the storage account, set Secure transfer required to Disabled in storage account configuration on Azure Portal. Secure transfer