You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/resource-governance-with-app-groups.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ You can create an application group using the Azure portal by following these st
36
36
1. For **Security context type**, select **Namespace Shared access policy**, **Event Hub Shared Access Policy** or **AAD application**.Application group supports the selection of SAS key at either namespace or at entity (event hub) level. When you create the application group, you should associate with either a shared access signatures (SAS) or Azure Active Directory(Azure AD) application ID, which is used by client applications.
37
37
1. If you selected **Namespace Shared access policy**:
38
38
1. For **SAS key name**, select the SAS policy that can be used as a security context for this application group.You can select **Add SAS Policy** to add a new policy and then associate with the application group.
39
-
2.
39
+
40
40
:::image type="content" source="./media/resource-governance-with-app-groups/Create-application-groups-with-namespace-shared-access-key.png" alt-text="Screenshot of the Add application group page with Namespace Shared access policy option selected.":::
41
41
1. If you selected **Event Hub Shared access policy**:
42
42
1. For **SAS key name**, copy the SAS policy name from Event Hubs "Shared Access Policies" Page and paste into textbox
@@ -48,7 +48,7 @@ You can create an application group using the Azure portal by following these st
48
48
49
49
:::image type="content" source="./media/resource-governance-with-app-groups/add-app-group-active-directory.png" alt-text="Screenshot of the Add application group page with Azure AD option.":::
Review the auto-generated **Client group ID**, which is the unique ID associated with the application group..The scope of application governance (namespace or entity level) would depend on the access level for the used Azure AD application ID.The following table shows auto generated Client Group ID for different security Context type:
53
53
54
54
| Security Context type | Auto-generated client group ID|
@@ -82,7 +82,7 @@ Review the auto-generated **Client group ID**, which is the unique ID associated
82
82
83
83
### [Azure CLI](#tab/cli)
84
84
Use the CLI command: [`az eventhubs namespace application-group create`](/cli/azure/eventhubs/namespace/application-group#az-eventhubs-namespace-application-group-create) to create an application group at Event Hubs namespace or event Hubs level. You must set --client-app-group-identifier based on the security
85
-
context type you are choosing. Please review the [table](#Supported-Security-Context-Type) above to know supported Security context type
85
+
context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
86
86
87
87
The following example creates an application group named `myAppGroup` in the namespace `mynamespace` in the Azure resource group `MyResourceGroup`. It uses the following configurations.
88
88
@@ -104,7 +104,7 @@ To learn more about the CLI command, see [`az eventhubs namespace application-gr
104
104
105
105
### [Azure PowerShell](#tab/powershell)
106
106
Use the PowerShell command: [`New-AzEventHubApplicationGroup`](/powershell/module/az.eventhub/new-azeventhubapplicationgroup) to create an application group at Event Hubs namespace or event Hubs level. You must set -ClientAppGroupIdentifier based on the security
107
-
context type you are choosing. Please review the [table](#Supported-Security-Context-Type) above to know supported Security context type
107
+
context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
108
108
109
109
The following example uses the [`New-AzEventHubThrottlingPolicyConfig`](/powershell/module/az.eventhub/new-azeventhubthrottlingpolicyconfig) to create two policies that will be associated with the application.
To learn more about the PowerShell command, see [`New-AzEventHubApplicationGroup`](/powershell/module/az.eventhub/new-azeventhubapplicationgroup).
126
126
127
127
### [ARM template](#tab/arm)
128
-
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template.You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#Supported-Security-Context-Type) above to know supported Security context type
128
+
The following example shows how to create an application group using an ARM template. In this example, the application group is associated with an existing SAS policy name `contososaspolicy` by setting the client `AppGroupIdentifier` as `NamespaceSASKeyName=contososaspolicy`. The application group policies are also defined in the ARM template.You must set ClientAppGroupIdentifier based on the security context type you are choosing. Please review the [table](#supported-security-context-type) above to know supported Security context type
0 commit comments