Skip to content

Commit bbccecb

Browse files
committed
MSI - RBAC - behavior
1 parent 0f7afa4 commit bbccecb

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

articles/event-hubs/authenticate-managed-identity.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Authenticate using managed identity
33
description: This article provides information about authenticating a managed identity with Microsoft Entra ID to access Azure Event Hubs resources
44
ms.topic: concept-article
5-
ms.date: 06/26/2024
5+
ms.date: 02/11/2025
66
ms.custom: subject-rbac-steps
77
#customer intent: As a developer, I want to know how to authenticate to an Azure event hub using a managed identity.
88
---
@@ -98,6 +98,10 @@ protected async void btnReceive_Click(object sender, EventArgs e)
9898
}
9999
```
100100

101+
> [!NOTE]
102+
> If the source service or app doesn't restart after the access to the event hub is disabled by removing the source's managed identity from the Event Hubs RBAC role, the source app may continue to publish events to the event hub until the token expires (default token validity is 24 hours). This behavior is by design.
103+
>
104+
> Therefore, after you remove the source's managed identity from the RBAC role, restart the source app or service to immediately expire the token and prevent it from sending events to the event hub.
101105
102106
## Event Hubs for Kafka
103107
You can use Apache Kafka applications to send messages to and receive messages from Azure Event Hubs using managed identity OAuth. See the following sample on GitHub: [Event Hubs for Kafka - send and receive messages using managed identity OAuth](https://github.com/Azure/azure-event-hubs-for-kafka/tree/master/tutorials/oauth/java/managedidentity).

0 commit comments

Comments
 (0)