I have used Azure Block for two or three projects. It's used to store images or videos for multi-tenant applications or a particular tenant. We recently did one project for multi-tenant products.
Any customer registered to the website can sell their product on a small scale without a website or server. It was like a platform as a service multi-tenant product. With the site ready, they can post any images or videos to Azure Storage Block. They're creating a subscription site for each unit.
For example, if you register on that website, you can allocate the memory size based on license cost: premium, gold, etc. We allocated some memory, and you can navigate to the site whenever you're ready. We provide a unique ID and an encryption key.
You can create several users for your subscription. For example, if you're an owner of this subscription, you can assign users a status as contributors, readers, or administrators. You can add images or videos through a Block via an administrative portal with a mobile or Angular application. That image is rendered to your website or any products they need. We can use that signature access key for authentication. We enable our product based on the site subscription ID.
There are different tiers, and you can create a container to solve this. First, we create a block and containers, then allocate images to that container. Once we make the container blocks, we get a primary and secondary access key. After you get the details, you can do the same for Azure. If you want to use your middleware, you need to add a library, so you can contribute a URL shared access key. You need to access it via UCA. You can upload via UCA binary format data or a content file. That is where we can upload any data with Block Storage.
When you access a unit to pass that Block ID, you can download it using ByteArray. You can send that ByteArray streaming data to your Angular application on mobile. They can convert any videos, images, or documents to display them on your mobile application. However, a security breach could allow a hacker to download anything for a particular user, so we recommended middleware for interacting with Azure Block Storage.
There are different approaches. We can use it for proper container image names or containerization with a shared activity URL. We need to consider the client's mission. If a client uses Azure Key Vault, any authorized person with the shared key can access confidential data on a centralized system. Our service can access that key to connect users to Azure Block, whether on your application, Angular, or any other web application. It will not provide users credentials or a URL directly.