How to restrict the user from upload/download or delete blob in storage account

Published 12-23-2019 07:42 AM 4,482 Views
Microsoft

Scenario

Let’s say, you have a requirement where in you don’t want the user (even the owner of the storage account) to do either upload, download or delete the blobs in an existing container in the storage account

We will cover how to accomplish this requirement in this blog.

Assessment:

There are a few built-in roles in Azure Storage which we can make use of and restrict the user from performing certain operations on Azure Storage Account. However, to accomplish the above requirement we need to customize the Role permissions.

I have come across another scenario where the user/group shouldn’t be able to delete / update the blobs once it is uploaded. For such scenario you can make use of the Immutable policy with time-based retention at the container level.

However, in our concerned scenario, this immutable policy doesn’t help as it will allow the user to upload or download the blob. Also, the user can create a new container. Moreover, to meet such requirement, we cannot make use of the built-in roles. We will need to create a custom role with customized permissions.

Steps to be followed:

You can make use of Azure PowerShell or Az CLI to create a custom RBAC role.

Pre-requisites:

  • Azure Storage account: You can use GPv2 Storage Account/Premium Block Blob Storage Account
  • Owner / Admin privileges on the subscription level to add the custom RBAC role

We will create a custom role named “Restrict user from upload or delete operation on Storage” which will restrict the user to perform upload or delete operation on blob.

 

Step 1:

We will create a JSON template giving the role definition of the custom role.


The following role definition creates a custom role that allows read access to storage but restricts user from upload and delete blob operation.

Create a new file C:\CustomRoles\customrole1.json with the following example. The ID should be set to null on initial role creation as a new ID is generated automatically.

{

       "Name": "Restrict user from upload or delete operation on Storage",

       "ID": null,

       "IsCustom": true,

       "Description": "This role will restrict the user from upload or delete operation on the storage account. However, customer will be able to see the storage account, container, blob.",

  "Actions": [

    "Microsoft.Storage/storageAccounts/read",

    "Microsoft.Storage/storageAccounts/blobServices/containers/read",

    "Microsoft.Storage/storageAccounts/blobServices/generateUserDelegationKey/action"

  ],

 

  "NotActions": [

    "Microsoft.Storage/storageAccounts/blobServices/containers/write",

    "Microsoft.Storage/storageAccounts/blobServices/containers/delete"

  ],

 

  "DataActions": [

    "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/read"

  ],

 

  "NotDataActions": [   

    "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/delete",

    "Microsoft.Storage/storageAccounts/blobServices/containers/blobs/write"

  ],

 

       "AssignableScopes": [

              "/subscriptions/d56662c7-xxxx"

       ]

}

 

Step 2:

Using the above role definition, we need to create a custom role in Azure RBAC. You can run the below powershell script to create a custom role:

 New-AzRoleDefinition -InputFile "C:\CustomRoles\customrole1.json"

 

Step 3:

To avoid the Read (download) operation from being performed you need to navigate to your storage account and Set the access tier of the blob to archive state. Note that the blob will not be downloaded when in archive state.

 

Step 4:

Assign the role that we created to the user from the “Access Control (IAM)” in the Storage blade in Azure Portal. Please refer to below screenshot:

image1.PNG

 

Step 5:

Let’s test the functionality now. Let the user login into the Azure Portal. The user will be denied access to the access keys or generate the SAS token as expected. Please see below:

image2.PNG

 

Now, if the user tries to perform any delete blob operation, the operation will fail. Please see below:

image3.PNG

 

Similarly, if user tries to upload or download the blob, the operation will fail. Also, if users try the same operation using Storage Explorer, the operation will fail. The user will not be able to create container or delete container as well.

 

Thus, by creating the above-mentioned custom role, the user will not be able to upload/download/delete blob from an existing container.

The user will just be able to list the blob in Azure Portal or in Storage Explorer Desktop Tool.

Hope this helps!

%3CLINGO-SUB%20id%3D%22lingo-sub-1081945%22%20slang%3D%22en-US%22%3ERe%3A%20How%20to%20restrict%20the%20user%20from%20upload%2Fdownload%20or%20delete%20blob%20in%20storage%20account%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1081945%22%20slang%3D%22en-US%22%3E%3CP%3EGreat%20helpful%20information%20sir%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ethanks%20and%20keep%20writing%20to%20share%20valuable%20information%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.samassociates.pk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3ESAM%20Associates%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-1078687%22%20slang%3D%22en-US%22%3EHow%20to%20restrict%20the%20user%20from%20upload%2Fdownload%20or%20delete%20blob%20in%20storage%20account%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1078687%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EScenario%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ELet%E2%80%99s%20say%2C%20you%20have%20a%20requirement%20where%20in%20you%20don%E2%80%99t%20want%20the%20user%20(even%20the%20owner%20of%20the%20storage%20account)%20to%20do%20either%20upload%2C%20download%20or%20delete%20the%20blobs%20in%20an%20existing%20container%20in%20the%20storage%20account%3C%2FP%3E%0A%3CP%3EWe%20will%20cover%20how%20to%20accomplish%20this%20requirement%20in%20this%20blog.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CU%3EAssessment%3A%20%3C%2FU%3E%3C%2FP%3E%0A%3CP%3EThere%20are%20a%20few%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Frole-based-access-control%2Fbuilt-in-roles%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ebuilt-in%20roles%3C%2FA%3E%20in%20Azure%20Storage%20which%20we%20can%20make%20use%20of%20and%20restrict%20the%20user%20from%20performing%20certain%20operations%20on%20Azure%20Storage%20Account.%20However%2C%20to%20accomplish%20the%20above%20requirement%20we%20need%20to%20customize%20the%20Role%20permissions.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EI%20have%20come%20across%20another%20scenario%20where%20the%20user%2Fgroup%20shouldn%E2%80%99t%20be%20able%20to%20delete%20%2F%20update%20the%20blobs%20once%20it%20is%20uploaded.%20For%20such%20scenario%20you%20can%20make%20use%20of%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fstorage%2Fblobs%2Fstorage-blob-immutable-storage%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EImmutable%20policy%20with%20time-based%20retention%3C%2FA%3E%20at%20the%20container%20level.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EHowever%2C%20in%20our%20concerned%20scenario%2C%20this%20immutable%20policy%20doesn%E2%80%99t%20help%20as%20it%20will%20allow%20the%20user%20to%20upload%20or%20download%20the%20blob.%20Also%2C%20the%20user%20can%20create%20a%20new%20container.%20Moreover%2C%20to%20meet%20such%20requirement%2C%20we%20cannot%20make%20use%20of%20the%20built-in%20roles.%20We%20will%20need%20to%20create%20a%20custom%20role%20with%20customized%20permissions.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3ESteps%20to%20be%20followed%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EYou%20can%20make%20use%20of%20Azure%20PowerShell%20or%20Az%20CLI%20to%20create%20a%20custom%20RBAC%20role.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EPre-requisites%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAzure%20Storage%20account%3A%20You%20can%20use%20GPv2%20Storage%20Account%2FPremium%20Block%20Blob%20Storage%20Account%3C%2FLI%3E%0A%3CLI%3EOwner%20%2F%20Admin%20privileges%20on%20the%20subscription%20level%20to%20add%20the%20custom%20RBAC%20role%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EWe%20will%20create%20a%20custom%20role%20named%20%E2%80%9C%3CSTRONG%3ERestrict%20user%20from%20upload%20or%20delete%20operation%20on%20Storage%3C%2FSTRONG%3E%E2%80%9D%20which%20will%20restrict%20the%20user%20to%20perform%20upload%20or%20delete%20operation%20on%20blob.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EStep%201%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EWe%20will%20create%20a%20JSON%20template%20giving%20the%20role%20definition%20of%20the%20custom%20role.%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3EThe%20following%20role%20definition%20creates%20a%20custom%20role%20that%20allows%20read%20access%20to%20storage%20but%20restricts%20user%20from%20upload%20and%20delete%20blob%20operation.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3ECreate%20a%20new%20file%26nbsp%3BC%3A%5CCustomRoles%5Ccustomrole1.json%26nbsp%3Bwith%20the%20following%20example.%20The%20ID%20should%20be%20set%20to%26nbsp%3B%3CSTRONG%3Enull%3C%2FSTRONG%3E%26nbsp%3Bon%20initial%20role%20creation%20as%20a%20new%20ID%20is%20generated%20automatically.%3C%2FP%3E%0A%3CTABLE%20width%3D%22629%22%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22629%22%3E%3CP%3E%3CEM%3E%7B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Name%22%3A%20%22Restrict%20user%20from%20upload%20or%20delete%20operation%20on%20Storage%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22ID%22%3A%20null%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22IsCustom%22%3A%20true%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Description%22%3A%20%22This%20role%20will%20restrict%20the%20user%20from%20upload%20or%20delete%20operation%20on%20the%20storage%20account.%20However%2C%20customer%20will%20be%20able%20to%20see%20the%20storage%20account%2C%20container%2C%20blob.%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%22Actions%22%3A%20%5B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2Fread%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fread%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2FgenerateUserDelegationKey%2Faction%22%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%5D%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%22NotActions%22%3A%20%5B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fwrite%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fdelete%22%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%5D%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%22DataActions%22%3A%20%5B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fblobs%2Fread%22%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%5D%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%22NotDataActions%22%3A%20%5B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fblobs%2Fdelete%22%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22Microsoft.Storage%2FstorageAccounts%2FblobServices%2Fcontainers%2Fblobs%2Fwrite%22%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%20%5D%2C%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22AssignableScopes%22%3A%20%5B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%22%2Fsubscriptions%2Fd56662c7-xxxx%22%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20%5D%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3E%7D%3C%2FEM%3E%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EStep%202%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EUsing%20the%20above%20role%20definition%2C%20we%20need%20to%20create%20a%20custom%20role%20in%20Azure%20RBAC.%20You%20can%20run%20the%20below%20powershell%20script%20to%20create%20a%20custom%20role%3A%3C%2FP%3E%0A%3CTABLE%3E%0A%3CTBODY%3E%0A%3CTR%3E%0A%3CTD%20width%3D%22628%22%3E%3CP%3E%26nbsp%3BNew-AzRoleDefinition%20-InputFile%20%22C%3A%5CCustomRoles%5Ccustomrole1.json%22%3C%2FP%3E%0A%3C%2FTD%3E%0A%3C%2FTR%3E%0A%3C%2FTBODY%3E%0A%3C%2FTABLE%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EStep%203%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ETo%20avoid%20the%20Read%20(download)%20operation%20from%20being%20performed%20you%20need%20to%20navigate%20to%20your%20storage%20account%20and%20Set%20the%20access%20tier%20of%20the%20blob%20to%20archive%20state.%20Note%20that%20the%20blob%20will%20not%20be%20downloaded%20when%20in%20archive%20state.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EStep%204%3A%3C%2FU%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EAssign%20the%20role%20that%20we%20created%20to%20the%20user%20from%20the%20%E2%80%9C%3CEM%3EAccess%20Control%20(IAM)%3C%2FEM%3E%E2%80%9D%20in%20the%20Storage%20blade%20in%20Azure%20Portal.%20Please%20refer%20to%20below%20screenshot%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image1.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F162963i72D1D427CC5483F4%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image1.PNG%22%20alt%3D%22image1.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CU%3EStep%205%3C%2FU%3E%3C%2FSTRONG%3E%3CSTRONG%3E%3A%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3ELet%E2%80%99s%20test%20the%20functionality%20now.%20Let%20the%20user%20login%20into%20the%20Azure%20Portal.%20The%20user%20will%20be%20denied%20access%20to%20the%20access%20keys%20or%20generate%20the%20SAS%20token%20as%20expected.%20Please%20see%20below%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image2.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F162966i743AEDC727B9C94F%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image2.PNG%22%20alt%3D%22image2.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%2C%20if%20the%20user%20tries%20to%20perform%20any%20delete%20blob%20operation%2C%20the%20operation%20will%20fail.%20Please%20see%20below%3A%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22image3.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F162967i0D6E52A86EFD8E06%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22image3.PNG%22%20alt%3D%22image3.PNG%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESimilarly%2C%20if%20user%20tries%20to%20upload%20or%20download%20the%20blob%2C%20the%20operation%20will%20fail.%20Also%2C%20if%20users%20try%20the%20same%20operation%20using%20Storage%20Explorer%2C%20the%20operation%20will%20fail.%26nbsp%3BThe%20user%20will%20not%20be%20able%20to%20create%20container%20or%20delete%20container%20as%20well.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThus%2C%20by%20creating%20the%20above-mentioned%20custom%20role%2C%20the%20user%20will%20not%20be%20able%20to%20upload%2Fdownload%2Fdelete%20blob%20from%20an%20existing%20container.%3CBR%20%2F%3E%3CBR%20%2F%3EThe%20user%20will%20just%20be%20able%20to%20list%20the%20blob%20in%20Azure%20Portal%20or%20in%20Storage%20Explorer%20Desktop%20Tool.%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%3EHope%20this%20helps!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1078687%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3EHow%20to%20restrict%20the%20user%20from%20upload%2Fdownload%20or%20delete%20blob%20in%20storage%20account%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1078687%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Storage%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Eblob%20storage%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPremium%20Storage%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Sep 15 2020 06:31 AM
Updated by: