AZ-900 Microsoft Azure Fundamentals 2020

Sign Up Free or Log In to participate!

Missing permissions in “Accessing and Using the Azure Cloud Shell” -Lab

Hey all,

I’m trying to work though the "Accessing and Using the Azure Cloud Shell" -lab, but when I try to create the cloudshell/powershell, the system compains that "Storage creation failed". In the dashboard we see the following:

"An error occured when trying to fetch resources. Additional details from the underlying API that might be helpful: Please provide below info when asking for support: timestamp = 2021-01-05T12:07:49.2218283Z, correlationId = 75ef707b-0f34-4a09-8ae2-f17841b72ce8. (Code: AccessDenied) Access is denied to the requested resource. The user might not have enough permission. (Code: AccessDenied) You can try accessing your resources using Resource Explorer. "

and at the storage creation we get a superlong json-ish type error report.

Anyone else having the same problem?

2 Answers

Hi Rami, 

For this particular hands-on lab, you will usually see this error when the cloud shell region has not been set to the same region as the pre-provisioned resource group/storage account. When setting up the storage for the cloud shell, you will need to go into the advanced settings and set the cloud shell region to match the region of the resource group/storage account.

Rami Luisto

Thanks you!

IoT is a platform to connect the things which have an internet. A connected device is a complex solution, with various potential entry doors for an attacker. A connected device pentest IoT includes tests on the entire object ecosystem. That is electronic layer, embedded softwares, communications protocol, servers, web and mobile interface. The pentest on the electrical side,embedded softwares, and communication protocol concern vulnerabilities more specifically the IoT.

There are three types of attacks on connected objects and embedded systems. Software attack, non-invasive and invasive hardware attacks. The first take advantage of software vulnerabilities, the second recover information from the hardware without damaging it while the third involve opening the components and therefore destroying them in order to be able to extract secrets. While the first two types of attacks do not require many resources, this is not thecase for invasive attacks, for which very expensive equipment is requires.

1. Increase Visibility Across Siloed Business Functions to Improve Business Maturity.

2. Drive Innovation with Data Analytics.

3. Improve Efficiency with Fleet Monitoring

4. Gain Real-time Insights from Connected Assets.

5. Increase Production with Data Analytics.

6. Monitor Workers to Mitigate Risk.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?