Skip to content

Commit 25f0219

Browse files
authored
Add prominent warning about DPS
1 parent 889d8e0 commit 25f0219

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/iot-hub/iot-hub-dev-guide-azure-ad-rbac.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: kgremban
77
ms.service: iot-hub
88
services: iot-hub
99
ms.topic: conceptual
10-
ms.date: 10/20/2021
10+
ms.date: 01/18/2023
1111
ms.custom: ['Role: Cloud Development', devx-track-azurecli]
1212
---
1313

@@ -94,14 +94,16 @@ The following table describes the permissions available for IoT Hub service API
9494
9595
## Azure AD access and shared access policies
9696

97-
By default, IoT Hub supports service API access through both Azure AD and [shared access policies and security tokens](iot-hub-dev-guide-sas.md). To minimize potential security vulnerabilities inherent in security tokens, disable access with shared access policies:
97+
By default, IoT Hub supports service API access through both Azure AD and [shared access policies and security tokens](iot-hub-dev-guide-sas.md). To minimize potential security vulnerabilities inherent in security tokens, disable access with shared access policies.
9898

9999
1. Ensure that your service clients and users have [sufficient access](#manage-access-to-iot-hub-by-using-azure-rbac-role-assignment) to your IoT hub. Follow the [principle of least privilege](../security/fundamentals/identity-management-best-practices.md).
100100
1. In the [Azure portal](https://portal.azure.com), go to your IoT hub.
101101
1. On the left pane, select **Shared access policies**.
102-
1. Under **Connect using shared access policies**, select **Deny**.
102+
1. Under **Connect using shared access policies**, select **Deny**, and review the warning.
103103
:::image type="content" source="media/iot-hub-dev-guide-azure-ad-rbac/disable-local-auth.png" alt-text="Screenshot that shows how to turn off IoT Hub shared access policies." border="true":::
104-
1. Review the warning, and then select **Save**.
104+
105+
> [!WARNING]
106+
> By denying connections using shared access policies, all users and services that connect using this method lose access immediately. Notably, since Device Provisioning Service (DPS) only supports linking IoT hubs using shared access policies, all device provisioning flows will fail with "unauthorized" error. Proceed carefully and plan to replace access with Azure AD role based access. **Do not proceed if you use DPS**.
105107
106108
Your IoT Hub service APIs can now be accessed only through Azure AD and RBAC.
107109

0 commit comments

Comments
 (0)