I have configured an Application Gateway with an Azure Storage Account blob as a backend target in a Backend Pool.
This enables public access to the contents of the blob storage via the App Gateway. However, when Blob anonymous access is disabled the health probe is receiving a 409 error (PublicAccessNotPermitted).
To resolve this issue I've assigned Storage Blob Data Reader permissions to the Managed Identity of the Application Gateway.
Unfortunately this hasn't resolved the issue. Is there a way for the Application Gateway to successfully authenticate with the Storage Account?
If not it seems the only other option would be to create a Static Website on the Storage Account.
Azure Application Gatewaydoes not support managed identities for accessingAzure Storage Accountswith authentication; it only supports managed identities forAzure Key Vault.To access an
Azure Storage Accountfrom anApplication Gateway's public IP, ensure that your storage is accessible over the public network. It is not possible to access the storage account authorized by using Managed Identity from the Application Gateway.Once I enable public access to the
storage account, I will be able to access it from theapplication gateway.Reference: Manage application identities securely and automatically