Skip to main content
Skip table of contents

Azure Blob Storage Setup

About this Page

This article guides users through configuring Azure Blob Storage within the Revyz app's setup wizard. It covers selecting the storage option, entering the specific Azure storage account and container names, and inputting necessary credentials like Tenant ID. The process completes after verifying the app has the required read/write permissions for the storage.

This step follows the last step detailed at the Installing the App page, if the user selects Azure Blog Storage from the Customer Managed Storage option.

Steps to complete Azure Blob storage setup.

Step 1: Select Azure Blob Storage
image-20251031-032137.png

Selection of Storage option

Step 2: Setting up an Azure Blob Storage
  • Complete the process detailed in the screenshot below to successfully set up an Azure blob storage. Note that you need necessary permissions to create and manage the resources. For details on how to complete steps on creation of the storage, refer this doc.

image-20250526-074325.png

To add address to access Revyz app on your Atlassian site, refer this page: IP Address based on Data Residency

Step 3: Enter the Azure Storage Account name
  • Give Azure storage account name and Azure storage container name which was created in your Azure account.

  • Click on 'Next'.

Screenshot from 2025-05-21 17-14-03-20250521-114403.png
Step 4: Adding Azure Credentials
  • On the next page, Add Azure Credentials:

    • Azure Tenant Id - Which is copied from Microsoft Entra Id.

    • Application (client) Id - Which is copied after creating the app.

    • Client secret - The value is copied after creating secret.

  • Click on 'Next'

image-20251110-050923.png

Step 5: Creating Custom Role in Azure RBAC
  • To follow the principle of least privilege, you will create a custom role in Azure RBAC (Role-Based Access Control). This role will define only the specific permissions Revyz needs (Write, Read, Tag) and nothing more.

  • For details:

This is a critical security step. Instead of giving the application a broad, built-in role (like "Contributor" or "Owner"), you will create a custom role using a JSON file. This ensures the application follows the principle of least privilege—it only gets the exact permissions it needs (to read, write, and tag data) and is explicitly denied dangerous permissions (like delete).

  1. Download the Custom Role JSON File

    • In the setup wizard, click the Custom role .json link to download the template.

    • This file contains the specific dataActions (permissions) required for the application to function correctly while restricting all other actions.

  2. Navigate to Your Resource Group

    • Log in to the Azure portal.

    • Go to the Resource Group you created for this setup (as per Step 1 of the full guide).

  3. Open Access Control (IAM)

  4. Add Custom Role

    • At the top of the IAM pane, click the Add button, then select Add custom role.

  5. Start from JSON

    • A new "Create a custom role" wizard will open.

    • On the Basics tab, for the "Baseline permissions," select Start from JSON.

    • Click the folder icon next to "Select a file" and upload the Custom role .json file you downloaded in the first step.

    • Azure Link: Tutorial: Create an Azure custom role using the Azure portal

  6. Review Permissions

    • Click Next to go to the Permissions tab.

    • Azure will have automatically imported the permissions from the JSON file. You can review them here if you wish, then click Next.

  7. Set Assignable Scopes

    • This step defines where this role can be assigned. It should already be scoped to your Resource Group.

    • If the scope is not set, click Add assignable scopes and select your Resource Group. Click Next.

  8. Review and Create

    • The final Review + create tab shows a summary of the role.

    • Confirm the details and click Create.

image-20251110-050923.png

Step 6: Verifying the Permissions
  • On the next page, it will verify the permissions:

    • WRITE: The Revyz application is confirmed to have write permissions, enabling it to add or alter blobs within this Azure Storage container.

    • READ: Read access for the storage container is verified, permitting the Revyz application to look at the contents held inside.

    • TAG: Tagging privileges are enabled, which allows the Revyz application to handle index tags for blobs in the container.

    • DELETE: By design, delete access is blocked; the Revyz application lacks permission to remove data, preventing accidental erasures.

  • Click on 'Ok'

image-20251110-050816.png

Step 7: Completing the prequisites

Download the JSON from Step: 7 and check ‘I have completed all prerequisites and ready to proceed with the setup’ and click on 'Next'.

Screenshot from 2025-05-21 17-11-27-20250521-114127.png

Step 8: Manage the Settings Page
  • Check settings page, confirm storage details.

  • Click on 'Next'.

  • Check Project list and click on 'Finish'.

  • If you want to run backup immediately, then select Run data immediately option

  • If you want to include new project’s issues to be backed up, Check “Include all new projects in the issues backup”. We recommend to check this option.

  • Check ‘I agree to all the settings’ option.

Manage Data screenshot.png
image-20251110-070916.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.