Skip to content

Commit 5540a98

Browse files
Merge pull request #303279 from alexwolfmsft/freshness-pass
Freshness pass
2 parents 9fc107e + b22f1dc commit 5540a98

File tree

5 files changed

+50
-54
lines changed

5 files changed

+50
-54
lines changed

articles/event-hubs/passwordless-migration-event-hubs.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,6 @@
22
title: Migrate applications to use passwordless authentication with Azure Event Hubs
33
titleSuffix: Azure Event Hubs
44
description: Learn to migrate existing applications away from Shared Key authorization with the account key to instead use Microsoft Entra ID and Azure role-based access control (RBAC) for enhanced security with Azure Event Hubs.
5-
author: alexwolfmsft
6-
ms.author: alexwolf
75
ms.date: 06/12/2023
86
ms.topic: how-to
97
ms.custom: devx-track-csharp, passwordless-java, passwordless-js, passwordless-python, passwordless-dotnet, passwordless-go, devx-track-azurecli, devx-track-azurepowershell

articles/service-bus-messaging/service-bus-migrate-azure-credentials.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,9 @@
11
---
22
title: Migrate applications to use passwordless authentication with Azure Service Bus
33
titleSuffix: Azure Service Bus
4-
description: Learn to migrate existing Service Bus applications away from connection strings to use Microsoft Entra ID and Azure RBAC for enhanced security.
5-
author: alexwolfmsft
6-
ms.author: alexwolf
4+
description: Learn to migrate existing Service Bus applications away from connection strings and use Microsoft Entra ID and Azure Role Based Access Control (RBAC) for enhanced security.
75
ms.reviewer: randolphwest
8-
ms.date: 06/12/2023
6+
ms.date: 07/25/2025
97
ms.topic: how-to
108
ms.custom:
119
- devx-track-csharp
@@ -24,7 +22,7 @@ Application requests to Azure Service Bus must be authenticated using either acc
2422

2523
## Security risks associated with access keys
2624

27-
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they've worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
25+
The following code example demonstrates how to connect to Azure Service Bus using a connection string that includes an access key. When you create a Service Bus, Azure generates these keys and connection strings automatically. Many developers gravitate towards this solution because it feels familiar to options they worked with in the past. If your application currently uses connection strings, consider migrating to passwordless connections using the steps described in this document.
2826

2927
## [.NET](#tab/dotnet)
3028

@@ -91,15 +89,15 @@ client = ServiceBusClient(
9189

9290
---
9391

94-
Connection strings should be used with caution. Developers must be diligent to never expose the keys in an unsecure location. Anyone who gains access to the key is able to authenticate. For example, if an account key is accidentally checked into source control, sent through an unsecure email, pasted into the wrong chat, or viewed by someone who shouldn't have permission, there's risk of a malicious user accessing the application. Instead, consider updating your application to use passwordless connections.
92+
Connection strings should be used with caution. Developers must be diligent to never expose the keys in an unsecure location. Anyone who gains access to the key is able to authenticate. For example, if an account key is accidentally checked into source control, sent through an unsecure email, or viewed by someone who shouldn't have permission, there's risk of a malicious user accessing the application. Instead, consider updating your application to use passwordless connections.
9593

9694
## Migrate to passwordless connections
9795

9896
[!INCLUDE [migrate-to-passwordless-overview](../../includes/passwordless/migration-guide/migrate-to-passwordless-overview.md)]
9997

10098
## Steps to migrate an app to use passwordless authentication
10199

102-
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. You'll first configure a local development environment, and then apply those concepts to an Azure app hosting environment. These same migration steps should apply whether you're using access keys directly, or through connection strings.
100+
The following steps explain how to migrate an existing application to use passwordless connections instead of a key-based solution. You first configure a local development environment, and then apply those concepts to an Azure app hosting environment. These same migration steps should apply whether you're using access keys directly, or through connection strings.
103101

104102
### Configure roles and users for local development authentication
105103

@@ -298,11 +296,11 @@ Next, update your code to use passwordless connections.
298296
299297
#### Run the app locally
300298
301-
After making these code changes, run your application locally. The new configuration should pick up your local credentials, such as the Azure CLI, Visual Studio, or IntelliJ. The roles you assigned to your local dev user in Azure will allow your app to connect to the Azure service locally.
299+
After making these code changes, run your application locally. The new configuration should pick up your local credentials, such as the Azure CLI, Visual Studio, or IntelliJ. The roles you assigned to your local dev user in Azure allows your app to connect to the Azure service locally.
302300
303301
### Configure the Azure hosting environment
304302
305-
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services after it's deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
303+
Once your application is configured to use passwordless connections and runs locally, the same code can authenticate to Azure services when deployed to Azure. For example, an application deployed to an Azure App Service instance that has a managed identity enabled can connect to Azure Service Bus.
306304
307305
#### Create the managed identity using the Azure portal
308306
@@ -405,7 +403,7 @@ az aks update \
405403
406404
#### Assign roles to the managed identity
407405
408-
Next, you need to grant permissions to the managed identity you created to access your Service Bus. You can do this by assigning a role to the managed identity, just like you did with your local development user.
406+
Next, you need to grant permissions to the managed identity you created to access your Service Bus. Assign a role to the managed identity, just like you did with your local development user.
409407
410408
### [Service Connector](#tab/assign-role-service-connector)
411409

0 commit comments

Comments
 (0)