Security considerations: SAS URI

1.Is there a reliable way to audit or detect if such publicly shared SAS URIs have been abused - Can you trace who accessed the file, from what IP, when — especially once the link is out there?

2. Even if the odds are low, how serious is the risk if a SAS URI containing PII is accidentally exposed (e.g., in logs, emails, chat, or browser history)?

3. Could a bot or unintended user realistically access data via a SAS URI if no IP restrictions are set? How would you mitigate this risk?

4. Are IP address restrictions reliable for protecting PII when using SAS URIs? Are there other effective mitigations?

If SAS URI is not really secure for PII, is there a different way I can use the SKY API to pull data from Raiser's Edge?

Answers

  • Alex Wong
    Alex Wong Community All-Star
    Ninth Anniversary Kudos 5 Facilitator 3 bbcon 2025 Attendee Badge

    Assuming you are talking about Query API

    sas_uri is available for 15 minutes only after query output has been successfully generated. See documentation on sas_uri here:

    That said, it is no more safe or unsafe than "magic link" used in various platforms now-a-day, if you are not sure what "magic link" is, it's worth looking it up.

    1. I am not aware of a client way to trace/audit the link. I can't speak if Blackbaud internally can
    2. as mentioned about, it's just about as safe as a "magic link" use to login to a user account rather than using password
    3. job id is provided to the user who executed the query (adhoc or by query id), then this job id is used to run a check on if the query has finished execution, and if it is, the sas uri is provided to this user to download the result. this user must be an internal user that has rights to execute query and logged in. I cannot imagine a case where a bot or unintended user will get a hold of this sas uri without the user (who ran the query) explicitly providing this sas uri to it/them. this would be no more dangerous than this user logging into RE NXT, ran the query manually, download the csv and send it to a bot/unintended user
    4. I do not believe Blackbaud blocks the sas uri from being used via IP, not sure where you read this

    As a programmer that do care deeply about security and data exposure, I do not think the use of SAS URI via Query API is insecure. But if you do not wish to use Query API, you can stick to the standard SKY API list endpoints to get constituent list, gift list, etc. You do have to keep in mind that Query API allows far more data to be available programmatically than these standard SKY API list endpoints.

    Hope that helps.