You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/jms-developer-guide.md
+64-13Lines changed: 64 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.date: 02/12/2022
9
9
10
10
This guide contains detailed information to help you succeed in communicating with Azure Service Bus using the Java Message Service (JMS) 2.0 API.
11
11
12
-
As a Java developer, if you are new to Azure Service Bus, please consider reading the below articles.
12
+
As a Java developer, if you're new to Azure Service Bus, please consider reading the below articles.
13
13
14
14
| Getting started | Concepts |
15
15
|----------------|-------|
@@ -51,24 +51,75 @@ The connection factory object is used by the client to connect with the JMS prov
51
51
52
52
Each connection factory is an instance of `ConnectionFactory`, `QueueConnectionFactory` or `TopicConnectionFactory` interface.
53
53
54
-
To simplify connecting with Azure Service Bus, these interfaces are implemented through `ServiceBusJmsConnectionFactory`, `ServiceBusJmsQueueConnectionFactory` and `ServiceBusJmsTopicConnectionFactory` respectively. The Connection factory can be instantiated with the below parameters -
54
+
To simplify connecting with Azure Service Bus, these interfaces are implemented through `ServiceBusJmsConnectionFactory`, `ServiceBusJmsQueueConnectionFactory` and `ServiceBusJmsTopicConnectionFactory` respectively.
55
+
56
+
> [!IMPORTANT]
57
+
> Java applications leveraging JMS 2.0 API can connect to Azure Service Bus using the connection string, or using a `TokenCredential` for leveraging Azure Active Directory (AAD) backed authentication.
Create a [system assigned managed identity](../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md) on Azure, and use this identity to create a `TokenCredential`.
Create a [user assigned managed identity](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity) on Azure, and use this identity to create a `TokenCredential`.
> Java applications leveraging JMS 2.0 API must connect to Azure Service Bus using the connection string only. Currently, authentication for JMS clients is only supported using the Connection string.
69
-
>
70
-
> Azure active directory (AAD) backed authentication is not currently supported.
71
-
>
122
+
---
72
123
73
124
### JMS destination
74
125
@@ -78,7 +129,7 @@ Destinations map to entities in Azure Service Bus - queues (in point to point sc
78
129
79
130
### Connections
80
131
81
-
A connection encapsulates a virtual connection with a JMS provider. With Azure Service Bus,this represents a stateful connection between the application and Azure Service Bus over AMQP.
132
+
A connection encapsulates a virtual connection with a JMS provider. With Azure Service Bus,this represents a stateful connection between the application and Azure Service Bus over AMQP.
82
133
83
134
A connection is created from the connection factory as shown below.
84
135
@@ -107,7 +158,7 @@ A session can be created with any of the below modes.
107
158
|**Session.DUPS_OK_ACKNOWLEDGE**|This acknowledgment mode instructs the session to lazily acknowledge the delivery of messages.|
108
159
|**Session.SESSION_TRANSACTED**|This value may be passed as the argument to the method createSession(int sessionMode) on the Connection object to specify that the session should use a local transaction.|
109
160
110
-
When the session mode is not specified, the **Session.AUTO_ACKNOWLEDGE** is picked by default.
161
+
When the session mode isn't specified, the **Session.AUTO_ACKNOWLEDGE** is picked by default.
111
162
112
163
### JMSContext
113
164
@@ -129,13 +180,13 @@ Just like the **Session** object, the JMSContext can be created with the same ac
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/migrate-jms-activemq-to-servicebus.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ As part of migrating and modifying your client applications to interact with Azu
58
58
59
59
#### Authentication and authorization
60
60
61
-
Azure role-based access control (Azure RBAC), backed by Azure Active Directory, is the preferred authentication mechanism for Service Bus. Because Azure RBAC, or claim-based authentication, isn't currently supported by Apache QPID JMS, however, you should use SAS keys for authentication.
61
+
Azure role-based access control (Azure RBAC), backed by Azure Active Directory, is the preferred authentication mechanism for Service Bus. To enable role-based access control, please follow the steps in the [Azure Service Bus JMS 2.0 developer guide](jms-developer-guide.md).
0 commit comments