Skip to content

Commit 6cac50e

Browse files
authored
Merge pull request #86562 from spelluru/ehubrbac0826
fixed issues based on feedback
2 parents 8bdd03c + ecf6c80 commit 6cac50e

File tree

2 files changed

+8
-5
lines changed

2 files changed

+8
-5
lines changed

articles/event-hubs/authorize-access-azure-active-directory.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ ms.author: spelluru
1313
---
1414

1515
# Authorize access to Event Hubs resources using Azure Active Directory
16-
Azure Event Hubs supports using Azure Active Directory (Azure AD) to authorize requests to Event Hubs resources. With Azure AD, you can use role-based access control (RBAC) to grant permissions to a security principal, which may be a user, group, or application service principal. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
16+
Azure Event Hubs supports using Azure Active Directory (Azure AD) to authorize requests to Event Hubs resources. With Azure AD, you can use role-based access control (RBAC) to grant permissions to a security principal, which may be a user, or an application service principal. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
1717

1818
## Overview
19-
When a security principal (a user, group, or application) attempts to access an Event Hubs resource, the request must be authorized. With Azure AD, access to a resource is a two-step process.
19+
When a security principal (a user, or an application) attempts to access an Event Hubs resource, the request must be authorized. With Azure AD, access to a resource is a two-step process.
2020

2121
1. First, the security principal’s identity is authenticated, and an OAuth 2.0 token is returned.
2222
1. Next, the token is passed as part of a request to the Event Hubs service to authorize access to the specified resource.
@@ -30,7 +30,7 @@ Native applications and web applications that make requests to Event Hubs can al
3030
## Assign RBAC roles for access rights
3131
Azure Active Directory (Azure AD) authorizes access rights to secured resources through [role-based access control (RBAC)](../role-based-access-control/overview.md). Azure Event Hubs defines a set of built-in RBAC roles that encompass common sets of permissions used to access event hub data and you can also define custom roles for accessing the data.
3232

33-
When an RBAC role is assigned to an Azure AD security principal, Azure grants access to those resources for that security principal. Access can be scoped to the level of subscription, the resource group, the Event Hubs namespace, or any resource under it. An Azure AD security principal may be a user, a group, an application service principal, or a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
33+
When an RBAC role is assigned to an Azure AD security principal, Azure grants access to those resources for that security principal. Access can be scoped to the level of subscription, the resource group, the Event Hubs namespace, or any resource under it. An Azure AD security principal may be a user, or an application service principal, or a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
3434

3535
## Built-in RBAC roles for Azure Event Hubs
3636
Azure provides the following built-in RBAC roles for authorizing access to Event Hubs data using Azure AD and OAuth:
@@ -58,7 +58,7 @@ For more information about how built-in roles are defined, see [Understand role
5858
## Next steps
5959
- Learn how to assign a built-in-RBAC role to a security principal, see [Authenticate access to Event Hubs resources using Azure Active Directory](authenticate-application.md).
6060
- Learn [how to create custom roles with RBAC](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Microsoft.Azure.EventHubs/Rbac/CustomRole).
61-
- Learn [How to use Azure Active Directory with EH](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Microsoft.Azure.EventHubs/Rbac/AzureEventHubsSDK)
61+
- Learn [how to use Azure Active Directory with EH](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Microsoft.Azure.EventHubs/Rbac/AzureEventHubsSDK)
6262

6363
See the following related articles:
6464

articles/event-hubs/authorize-access-event-hubs.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,10 @@ Azure Event Hubs offers the following options for authorizing access to secure r
1919
## Azure Active Directory
2020
Azure Active Directory (Azure AD) integration for Event Hubs resources provides role-based access control (RBAC) for fine-grained control over a client’s access to resources. You can use role-based access control (RBAC) to grant permissions to security principal, which may be a user, a group, or an application service principal. The security principal is authenticated by Azure AD to return an OAuth 2.0 token. The token can be used to authorize a request to access an Event Hubs resource.
2121

22-
For more information about authenticating with Azure AD, see [Authenticating requests to Azure Event Hubs using Azure Active Directory](authenticate-application.md). For more information about authorizing with Azure AD, see [Authorize access to Event Hubs resources using Azure Active Directory](authorize-access-azure-active-directory.md).
22+
For more information about authenticating with Azure AD, see the following articles:
23+
24+
- [Authenticate requests to Azure Event Hubs using Azure Active Directory](authenticate-application.md)
25+
- [Authorize access to Event Hubs resources using Azure Active Directory](authorize-access-azure-active-directory.md).
2326

2427
## Share access signatures
2528
Shared access signatures (SAS) for Event Hubs resources provide limited delegated access to Event Hubs resources. Adding constraints on time interval for which the signature is valid or on permissions it grants provides flexibility in managing resources. For more information, see [Authenticate using shared access signatures (SAS)](authenticate-shared-access-signature.md).

0 commit comments

Comments
 (0)