Skip to content

Commit 4a5bdcc

Browse files
authored
Merge pull request #109797 from spelluru/ehubcleanup0331
ARM
2 parents 89e7925 + 6e5f456 commit 4a5bdcc

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/event-hubs/authorize-access-event-hubs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ Azure Event Hubs offers the following options for authorizing access to secure r
2323
> This article applies to both Event Hubs and [Apache Kafka](event-hubs-for-kafka-ecosystem-overview.md) scenarios.
2424
2525
## Azure Active Directory
26-
Azure Active Directory (Azure AD) integration for Event Hubs resources provides role-based access control (RBAC) for fine-grained control over a clients access to resources. You can use role-based access control (RBAC) to grant permissions to security principal, which may be a user, a group, or an application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can be used to authorize a request to access an Event Hubs resource.
26+
Azure Active Directory (Azure AD) integration for Event Hubs resources provides role-based access control (RBAC) for fine-grained control over a client's access to resources. You can use role-based access control (RBAC) to grant permissions to security principal, which may be a user, a group, or an application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can be used to authorize a request to access an Event Hubs resource.
2727

2828
For more information about authenticating with Azure AD, see the following articles:
2929

@@ -35,7 +35,7 @@ Shared access signatures (SAS) for Event Hubs resources provide limited delegate
3535

3636
Authorizing users or applications using an OAuth 2.0 token returned by Azure AD provides superior security and ease of use over shared access signatures (SAS). With Azure AD, there's no need to store the access tokens with your code and risk potential security vulnerabilities. While you can continue to use shared access signatures (SAS) to grant fine-grained access to Event Hubs resources, Azure AD offers similar capabilities without the need to manage SAS tokens or worry about revoking a compromised SAS.
3737

38-
By default, all Event Hubs resources are secured, and are available only to the account owner. Although you can use any of the authorization strategies outlined above to grant clients access to Event Hub resources. Only Event Hubs resources created with Azure Resource Manager deployment model support Azure AD authorization. Microsoft recommends using Azure AD when possible for maximum security and ease of use.
38+
By default, all Event Hubs resources are secured, and are available only to the account owner. Although you can use any of the authorization strategies outlined above to grant clients access to Event Hub resources. Microsoft recommends using Azure AD when possible for maximum security and ease of use.
3939

4040
For more information about authorization using SAS, see [Authorizing access to Event Hubs resources using Shared Access Signatures](authorize-access-shared-access-signature.md).
4141

0 commit comments

Comments
 (0)