!!!Renew Azure SAS token via Azure User impersonation
\\
This example demonstrates using the Azure Delegation settings to renew an Azure SAS token configured on a user at [User Manager]. For more info see: Authorize access to blobs using Microsoft Entra ID Link: [https://learn.microsoft.com/en-us/azure/storage/blobs/authorize-access-azure-active-directory]\\
The job is eligible for daily scheduling.\\ 
\\
[attachments|renew_azure_sas_token_user_impersonation_full.png]\\
\\
User's Azure Blob VFS with user delegation settings (for more info see: [Azure Integration]):\\ 
\\
[attachments|azure_blob_user_delegation_settings.png]\\
\\
__Section 1.__\\
\\
It loads the user's VFS file, parses it, and retrieves the previous SAS token expiry date.\\
\\
[attachments|find_azure_vfs_file.png]\\
\\
__!!!Configure __your user's VFS path at the Find task.\\
\\
[attachments|file_parse_azure_vfs_file.png]\\
\\
[attachments|get_azure_sas_token_info.png]\\
\\
__Section 2.__\\
\\
Check the SAS token expires and store the refresh token. The refresh token needs to be stored each time. We store it as a persistent variable. \\
\\