Hi MrFlinstone The 403 Forbidden error you're encountering usually indicates a permissions issue with the managed identity on the new storage account. Even though you’ve assigned the Storage Blob Data Contributor role, the pipeline requires specific ACL (Access Control List) permissions on the folders within the Data Lake, especially when using hierarchical namespace (ADLS Gen2).
Based on the official documentation, for the sink, the managed identity needs:
- Execute permission on all parent folders (upstream folders and file system).
- Write permission on the target sink folder.
Assigning just the Storage Blob Data Contributor role via IAM might not automatically grant these ACL permissions. You can grant these using Storage Explorer or Azure CLI:
- Open the target storage account in Storage Explorer.
- Navigate to the container and folder where the sink writes data.
- Right-click the folder, go to Manage Access or Access Control, and add the managed identity with Execute permissions on the folder hierarchy and Write on the sink folder.
If your original storage account “worked without explicitly setting Execute permissions,” it’s likely those permissions were inherited or pre-configured. For the new storage account, explicitly setting these ACL permissions should resolve the 403 error.
Also, double-check:
- The managed identity you configured is the one used by the Synapse pipeline’s linked service.
- The linked service’s authentication is set to use the managed identity properly.
- No firewall or network restrictions block access to the new storage account
Hope this helps. If this answers your query, do click Accept Answer
and Yes
for was this answer helpful. And, if you have any further query do let us know.