Skip to content

Commit 4cbfaab

Browse files
authored
Merge pull request #207618 from enkrumah/patch-46
Update service-bus-managed-identity.md
2 parents d7a9d4c + 40a1127 commit 4cbfaab

File tree

1 file changed

+3
-7
lines changed

1 file changed

+3
-7
lines changed

articles/stream-analytics/service-bus-managed-identity.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: enkrumah
55
ms.author: ebnkruma
66
ms.service: stream-analytics
77
ms.topic: how-to
8-
ms.date: 08/09/2022
8+
ms.date: 08/10/2022
99
ms.custom: subject-rbac-steps
1010
---
1111

@@ -37,14 +37,10 @@ First, you create a managed identity for your Azure Stream Analytics job. 
3737

3838
## Grant the Stream Analytics job permissions to access Azure Service Bus
3939

40-
For the Stream Analytics job to access your Service Bus using managed identity, the service principal you created must have special permissions to your Azure Service Bus resource. In this step, you can assign a role to your stream analytics job's system-assigned managed identity. Azure provides the below Azure built-in roles for authorizing access to a Service Bus namespace. For Azure Stream Analytics you would need these:
40+
For the Stream Analytics job to access your Service Bus using managed identity, the service principal you created must have special permissions to your Azure Service Bus resource. In this step, you can assign a role to your stream analytics job's system-assigned managed identity. Azure provides the below Azure built-in roles for authorizing access to a Service Bus namespace. For Azure Stream Analytics you would need this role:
4141

42-
- [Azure Service Bus Data Owner](../role-based-access-control/built-in-roles.md#azure-service-bus-data-owner): Enables data access to Service Bus namespace and its entities (queues, topics, subscriptions, and filters)
4342
- [Azure Service Bus Data Sender](../role-based-access-control/built-in-roles.md#azure-service-bus-data-sender): Use this role to give send access to Service Bus namespace and its entities.
4443

45-
> [!TIP]
46-
> When you assign roles, assign only the needed access. For more information about the importance of least privilege access, see the [Lower exposure of privileged accounts](../security/fundamentals/identity-management-best-practices.md#lower-exposure-of-privileged-accounts) article.
47-
4844
1. Select **Access control (IAM)**.
4945

5046
2. Select **Add** > **Add role assignment** to open the **Add role assignment** page.
@@ -53,7 +49,7 @@ For the Stream Analytics job to access your Service Bus using managed identity,
5349

5450
| Setting | Value |
5551
| --- | --- |
56-
| Role | Azure Service Bus Data Owner or Azure Service Bus Data Sender |
52+
| Role | Azure Service Bus Data Sender |
5753
| Assign access to | User, group, or service principal |
5854
| Members | \<Name of your Stream Analytics job> |
5955

0 commit comments

Comments
 (0)