# AzCopy If the DPR wishes to use [`AzCopy`](https://learn.microsoft.com/en-us/azure/storage/common/storage-use-azcopy-v10), work with them to come up with an appropriate ingress procedure, which might look something like: 1. Using a secure out-of-band communication method (such as a secure email or messaging service), the data provider sends {ref}`role_tresa` a URL where the data can be downloaded. - This might be another cloud storage provider (eg. an AWS S3 bucket or Google Cloud Storage bucket), an SFTP server or a password-protected https server. 2. The {ref}`role_tresa` use AzCopy to copy the data to the storage account. (azcopy_gc)= ## Ingress from Google Cloud with AzCopy ```{Note} This method is used by the EDoN data wrangling project ``` 1. Ask the DPR to create a [service account key](https://cloud.google.com/iam/docs/keys-create-delete#iam-service-account-keys-create-gcloud) and send this, along with the `` and `` via the secure egress email service to `trustedresearch@turing.ac.uk` (or your own email) - Note: you'll need to request approval for your own account when attempting to access a secure egress email from the shared mailbox; you might want to inform the DPR of this 2. Go to the [Data Safe Haven System Manager instructions](https://data-safe-haven.readthedocs.io/en/v4.2.2/roles/system_manager/manage_data.html#data-ingress) for ingress (make sure you are reading the version of the docs appropriate to the deployed SRE) and follow the guide on how to generate a SAS URL 3. Complete the transfer with AZCopy: ```shell azcopy copy 'https://storage.cloud.google.com//' 'https://data.blob.core.windows.net/ingress/' ``` ```{note} It may be possible to do this without a SAS url, via authenticating your admin account with `AzCopy`. ```