Skip to content

Commit 53394b6

Browse files
Merge pull request #205731 from spelluru/relayrbacga0722
Relay RBAC GA
2 parents e88bdc4 + 847e06f commit 53394b6

File tree

4 files changed

+32
-10
lines changed

4 files changed

+32
-10
lines changed

articles/azure-relay/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@
4040
href: relay-authentication-and-authorization.md
4141
- name: Use Azure Active Directory
4242
items:
43-
- name: Authenticate with managed identities (Preview)
43+
- name: Authenticate with managed identities
4444
href: authenticate-managed-identity.md
45-
- name: Authenticate from an application (Preview)
45+
- name: Authenticate from an application
4646
href: authenticate-application.md
4747
- name: Network security
4848
href: network-security.md

articles/azure-relay/authenticate-application.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,16 @@
11
---
2-
title: Authenticate from an application - Azure Relay (Preview)
2+
title: Authenticate from an application - Azure Relay
33
description: This article provides information about authenticating an application with Azure Active Directory to access Azure Relay resources.
44
ms.topic: article
5-
ms.date: 06/21/2022
5+
ms.date: 07/22/2022
66
---
77

8-
# Authenticate and authorize an application with Azure Active Directory to access Azure Relay entities (Preview)
8+
# Authenticate and authorize an application with Azure Active Directory to access Azure Relay entities
99
Azure Relay supports using Azure Active Directory (Azure AD) to authorize requests to Azure Relay entities (Hybrid Connections, WCF Relays). With Azure AD, you can use Azure role-based access control (Azure RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
1010

11+
> [!NOTE]
12+
> This feature is generally available in all regions except Microsoft Azure operated by 21Vianet (Azure China).
13+
1114

1215
[!INCLUDE [relay-roles](./includes/relay-roles.md)]
1316

@@ -92,6 +95,12 @@ Here's the code from the sample that shows how to use Azure AD authentication to
9295
var sender = new HybridConnectionClient(hybridConnectionUri, tokenProvider);
9396
```
9497

98+
## Samples
99+
100+
- Hybrid Connections: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/dotnet/rolebasedaccesscontrol), [Java](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/java/role-based-access-control), [JavaScript](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/node/rolebasedaccesscontrol)
101+
- WCF Relay: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/wcf-relay/RoleBasedAccessControl)
102+
103+
95104
## Next steps
96105
- To learn more about Azure RBAC, see [What is Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md)?
97106
- To learn how to assign and manage Azure role assignments with Azure PowerShell, Azure CLI, or the REST API, see these articles:

articles/azure-relay/authenticate-managed-identity.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,18 @@
11
---
2-
title: Authenticate with managed identities for Azure Relay resources (preview)
2+
title: Authenticate with managed identities for Azure Relay resources
33
description: This article describes how to use managed identities to access with Azure Relay resources.
44
ms.topic: article
5-
ms.date: 06/21/2022
5+
ms.date: 07/22/2022
66
---
77

8-
# Authenticate a managed identity with Azure Active Directory to access Azure Relay resources (preview)
8+
# Authenticate a managed identity with Azure Active Directory to access Azure Relay resources
99
[Managed identities for Azure resources](../active-directory/managed-identities-azure-resources/overview.md) is a cross-Azure feature that enables you to create a secure identity associated with the deployment under which your application code runs. You can then associate that identity with access-control roles that grant custom permissions for accessing specific Azure resources that your application needs.
1010

1111
With managed identities, the Azure platform manages this runtime identity. You don't need to store and protect access keys in your application code or configuration, either for the identity itself, or for the resources you need to access. A Relay client app running inside an Azure App Service application or in a virtual machine with enabled managed entities for Azure resources support doesn't need to handle SAS rules and keys, or any other access tokens. The client app only needs the endpoint address of the Relay namespace. When the app connects, Relay binds the managed entity's context to the client in an operation that is shown in an example later in this article. Once it's associated with a managed identity, your Relay client can do all authorized operations. Authorization is granted by associating a managed entity with Relay roles.
1212

13+
> [!NOTE]
14+
> This feature is generally available in all regions except Microsoft Azure operated by 21Vianet (Azure China).
15+
1316
[!INCLUDE [relay-roles](./includes/relay-roles.md)]
1417

1518
## Enable managed identity
@@ -61,6 +64,11 @@ Here's the code from the sample that shows how to use Azure AD authentication to
6164
var sender = new HybridConnectionClient(hybridConnectionUri, tokenProvider);
6265
```
6366

67+
## Samples
68+
69+
- Hybrid Connections: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/dotnet/rolebasedaccesscontrol), [Java](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/java/role-based-access-control), [JavaScript](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/node/rolebasedaccesscontrol)
70+
- WCF Relay: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/wcf-relay/RoleBasedAccessControl)
71+
6472
## Next steps
6573
To learn more about Azure Relay, see the following topics.
6674
- [What is Relay?](relay-what-is-it.md)

articles/azure-relay/relay-authentication-and-authorization.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
title: Azure Relay authentication and authorization | Microsoft Docs
33
description: This article provides an overview of Shared Access Signature (SAS) authentication with the Azure Relay service.
44
ms.topic: article
5-
ms.date: 06/21/2022
5+
ms.date: 07/22/2022
66
---
77

88
# Azure Relay authentication and authorization
99
There are two ways to authenticate and authorize access to Azure Relay resources: Azure Active Directory (Azure AD) and Shared Access Signatures (SAS). This article gives you details on using these two types of security mechanisms.
1010

11-
## Azure Active Directory (Preview)
11+
## Azure Active Directory
1212
Azure AD integration for Azure Relay resources provides Azure role-based access control (Azure RBAC) for fine-grained control over a client’s access to resources. You can use Azure RBAC to grant permissions to a security principal, which may be a user, a group, or an application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can be used to authorize a request to access an Azure Relay resource.
1313

1414
For more information about authenticating with Azure AD, see the following articles:
@@ -50,6 +50,11 @@ To access an entity, the client requires a SAS token generated using a specific
5050

5151
SAS authentication support for Azure Relay is included in the Azure .NET SDK versions 2.0 and later. SAS includes support for a [SharedAccessAuthorizationRule](/dotnet/api/microsoft.servicebus.messaging.sharedaccessauthorizationrule). All APIs that accept a connection string as a parameter include support for SAS connection strings.
5252

53+
## Samples
54+
55+
- Hybrid Connections: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/dotnet/rolebasedaccesscontrol), [Java](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/java/role-based-access-control), [JavaScript](https://github.com/Azure/azure-relay/tree/master/samples/hybrid-connections/node/rolebasedaccesscontrol)
56+
- WCF Relay: [.NET](https://github.com/Azure/azure-relay/tree/master/samples/wcf-relay/RoleBasedAccessControl)
57+
5358
## Next steps
5459

5560
- Continue reading [Service Bus authentication with Shared Access Signatures](../service-bus-messaging/service-bus-sas.md) for more details about SAS.

0 commit comments

Comments
 (0)