You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/service-bus-managed-service-identity.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Managed identities for Azure resources with Service Bus
3
3
description: This article describes how to use managed identities to access with Azure Service Bus entities (queues, topics, and subscriptions).
4
4
ms.topic: article
5
-
ms.date: 06/15/2023
5
+
ms.date: 07/22/2024
6
6
---
7
7
8
8
# Authenticate a managed identity with Microsoft Entra ID to access Azure Service Bus resources
@@ -12,14 +12,14 @@ Here are the high-level steps to use a managed identity to access a Service Bus
12
12
13
13
1. Enable managed identity for your client app or environment. For example, enable managed identity for your Azure App Service app, Azure Functions app, or a virtual machine in which your app is running. Here are the articles that help you with this step:
14
14
-[Configure managed identities for App Service and Azure Functions](../app-service/overview-managed-identity.md)
15
-
-[Configure managed identities for Azure resources on a VM](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
15
+
-[Configure managed identities for Azure resources on a virtual machine (VM)](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md)
16
16
1. Assign Azure Service Bus Data Owner, Azure Service Bus Data Sender, or Azure Service Bus Data Receiver role to the managed identity at the appropriate scope (Azure subscription, resource group, Service Bus namespace, or Service Bus queue or topic). For instructions to assign a role to a managed identity, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.yml).
17
17
1. In your application, use the managed identity and the endpoint to Service Bus namespace to connect to the namespace.
18
18
19
19
For example, in .NET, you use the [ServiceBusClient](/dotnet/api/azure.messaging.servicebus.servicebusclient.-ctor#azure-messaging-servicebus-servicebusclient-ctor(system-string-azure-core-tokencredential)) constructor that takes `TokenCredential` and `fullyQualifiedNamespace` (a string, for example: `cotosons.servicebus.windows.net`) parameters to connect to Service Bus using the managed identity. You pass in [DefaultAzureCredential](/dotnet/api/azure.identity.defaultazurecredential), which derives from `TokenCredential` and uses the managed identity. In `DefaultAzureCredentialOptions`, set the `ManagedIdentityClientId` to the ID of client's managed identity.
@@ -35,7 +35,7 @@ Here are the high-level steps to use a managed identity to access a Service Bus
35
35
>YoucandisablelocalorSASkeyauthenticationfor a Service Bus namespace and allow only Microsoft Entra authentication. For step-by-step instructions, see [Disable local authentication](disable-local-authentication.md).
36
36
37
37
## Azure built-in roles for Azure Service Bus
38
-
MicrosoftEntraauthorizesaccesstosecuredresourcesthrough [Azurerole-basedaccesscontrol (AzureRBAC)](../role-based-access-control/overview.md). AzureServiceBusdefinesasetofAzurebuilt-inrolesthatencompasscommonsetsofpermissionsusedtoaccessServiceBusentities. Youcanalsodefinecustomrolesfor accessing the data.
38
+
MicrosoftEntraauthorizesaccesstosecuredresourcesthrough [Azurerole-basedaccesscontrol (RBAC)](../role-based-access-control/overview.md). AzureServiceBusdefinesasetofAzurebuilt-inrolesthatencompasscommonsetsofpermissionsusedtoaccessServiceBusentities. Youcanalsodefinecustomrolesfor accessing the data.
39
39
40
40
Azure provides the following Azure built-in roles for authorizing access to a Service Bus namespace:
41
41
@@ -51,7 +51,7 @@ Before you assign an Azure role to a managed identity, determine the scope of ac
0 commit comments