Skip to content

Commit 7f7996b

Browse files
Apply suggestions from PR review
1 parent 892c296 commit 7f7996b

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/event-hubs/authenticate-shared-access-signature.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,8 +215,8 @@ To authenticate back-end applications that consume from the data generated by Ev
215215
## Disabling Local/SAS Key authentication
216216
For certain organizational security requirements, you may have to disable local/SAS key authentication completely and rely on the Azure Active Directory (Azure AD) based authentication which is the recommended way to connect with Azure Event Hubs. You can disable local/SAS key authentication at the Event Hubs namespace level using Azure portal or Azure Resource Manager template.
217217
218-
### Disabling Local/SAS Key authentication via Portal
219-
You can disable local/SAS key authentication for a given Event Hubs namespace using Azure Portal.
218+
### Disabling Local/SAS Key authentication via the portal
219+
You can disable local/SAS key authentication for a given Event Hubs namespace using the Azure portal.
220220
221221
As shown in the following image, in the namespace overview section, click on the *Local Authentication*.
222222

articles/event-hubs/authorize-access-shared-access-signature.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The rights provided by the policy rule can be a combination of:
3333
> [!NOTE]
3434
> The **Manage** right includes the **Send** and **Listen** rights.
3535
36-
A namespace or entity policy can hold up to 12 shared access authorization rules, providing room for the three sets of rules, each covering the basic rights, and the combination of Send and Listen. This limit underlines that the SAS policy store isn't intended to be a user or service account store. If your application needs to grant, access to Event Hubs resources based on user or service identities, it should implement a security token service that issues SAS tokens after an authentication and access check.
36+
A namespace or entity policy can hold up to 12 shared access authorization rules, providing room for the three sets of rules, each covering the basic rights, and the combination of Send and Listen. This limit underlines that the SAS policy store isn't intended to be a user or service account store. If your application needs to grant access to Event Hubs resources based on user or service identities, it should implement a security token service that issues SAS tokens after an authentication and access check.
3737

3838
An authorization rule is assigned a **primary key** and a **secondary key**. These keys are cryptographically strong keys. Don’t lose them or leak them. They’ll always be available in the Azure portal. You can use either of the generated keys, and you can regenerate them at any time. If you regenerate or change a key in the policy, all previously issued tokens based on that key become instantly invalid. However, ongoing connections created based on such tokens will continue to work until the token expires.
3939

0 commit comments

Comments
 (0)