Microsoft Azure Blob Storage
Learn how to import your Azure Blob Storage data to Labelbox via IAM delegated access.
When you use IAM delegated access to add your unlabeled data to Labelbox, you can keep your assets in Microsoft Azure Blob Storage and grant Labelbox read-only access to your Azure storage containers.

Azure Delegated Access client request flow
Azure Data Lake Storage
Labelbox is currently not compatible with ADLS Gen2. To set up this integration, you must use Azure Blob Storage.
Step 1: Get tenant ID and container URL
First, you will need to get the relevant information for this integration from your Microsoft Azure account.
- Navigate to your Azure blob storage container that you want to use with Labelbox.

Copy Azure storage container URL
- Navigate to Azure Active Directory and select the desired tenant you want to use with Labelbox.

Copy Tenant ID from Azure Active Directory
Step 2: Create Azure integration in Labelbox
Next, open up a new integration in Labelbox and input the information you gathered in the previous section.
-
Log into Labelbox.
-
Navigate to the Integrations tab and click New integration.
-
Select the Azure integration.
-
Enter the details from Step 1.
-
If this is your first time setting this up, please follow instructions under Attach roles to add Labelbox to your Azure tenant.


Azure can take a few hours to create this service principal once you hit Accept.
If you are not sure about the creation, confirm by searching for the application using these steps.
Step 3: Grant the permissions to the Labelbox app
Now, you must assign roles to the Container and its parent Storage Account.
Permissions | Resource |
---|---|
Storage Blob Delegator | Parent Storage Account |
Storage Blob Data Reader | Container |
Firewall settings
If you have IP restrictions for the storage account, make to sure to add the Labelbox IP address of
35.223.142.181
to the firewall. [Learn more].
Storage Blob Delegator
-
Navigate to Access Control (IAM) page within your Storage Account. Note that this is the parent resource within which Containers exist.
-
Click Add role assignment, Add Storage Blob Delegator, and assign to Labelbox Delegated Access app.

Access Control (IAM) page for Storage Account
Storage Blob Data Reader
-
Navigate to Access Control (IAM) page within your Container.
-
Click Add role assignment, Add Storage Blob Data Reader and assign to Labelbox Delegated Access app.

Access Control (IAM) page for Container
RBAC changes can take up to 30 mins
If you are running into any issues, such as the dataset not loading in Labelbox, it is likely that the permissions are not applied correctly. Any role-based-access-control (RBAC) changes you make can take up to 30 mins to take into effect. Learn more.
Permissions
To grant admin consent for Labelbox, you must set the following permissions. Note: Labelbox only requires tenant ID and no certificate/secret.
Step 4: Validate the integration
In this final step, go back to the Integrations tab in the Labelbox UI and check whether the integration setup was successful.

Example Azure URL
Ensure that you are using Azure URLs when creating datasets. Read Azure docs to learn how to generate blob URL in a container.
https://labelboxdatasets.blob.core.windows.net/datasets/geospatial/001.jpg
Step 5: Set up CORS headers
Follow these steps to set the CORS Headers
Now proceed to generate a JSON file containing Azure Blob Storage URIs.
Step 6: Upload data
Now that the connection is established, use the SDK to connect data to Labelbox. Click through the links below to find the import format and instructions for uploading your data type.
Data type | Supported |
---|---|
Images | Import specifications |
Video | Import specifications |
Text | Import specifications |
Tiled imagery (Slippy maps) | Not supported |
Tiled imagery (COG, NITF, GeoTIFF) | Import specifications |
Audio | Import specifications |
DICOM | Import specifications |
Document | Import specifications |
Conversation | Import specifications |
Updated 4 months ago