!!!Renew Azure SAS token via Azure User impersonation
\\
This example demonstrates using the Azure Delegation settings to renew an Azure SAS token configured on a user at [User Manager]. For more info see: Authorize access to blobs using Microsoft Entra ID Link: [https://learn.microsoft.com/en-us/azure/storage/blobs/authorize-access-azure-active-directory]\\
The job is eligible for daily scheduling.\\ 
\\
[attachments|renew_azure_sas_token_user_impersonation_full.png]\\
\\
User's Azure Blob VFS with user delegation settings (for more info see: [Azure Integration]):\\ 
\\
[attachments|azure_blob_user_delegation_settings.png]\\
\\
__Section 1.__\\
\\
It loads the user's VFS file, parses it, and retrieves the previous SAS token expiry date.\\
\\
[attachments|find_azure_vfs_file.png]\\
\\
__!!!Configure __your user's VFS path at the Find task.\\
\\
[attachments|file_parse_azure_vfs_file.png]\\
\\
[attachments|get_azure_sas_token_info.png]\\
\\
__Section 2.__\\
\\
Verify the expiration of the SAS token and store the refresh token. The refresh token must be saved each time and stored as a persistent variable. \\
\\
[attachments|jump_difference_greater_then_zero.png]\\
\\
Set the difference to zero if less than zero.\\
\\
[attachments|set_difference_as_zreo.png]\\
\\
Check if difference is less then two days.\\
\\
[attachments||check_if_difference_is_less_then_two_day.png]\\
\\