Skip to content

Commit c74bb37

Browse files
committed
Acrolynx
1 parent b16a7e8 commit c74bb37

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/event-hubs/authenticate-shared-access-signature.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: devx-track-js, devx-track-csharp
99
# Authenticate access to Event Hubs resources using shared access signatures (SAS)
1010
Shared access signature (SAS) gives you granular control over the type of access you grant to the clients who has the shared access signature. Here are some of the controls you can set in a SAS:
1111

12-
- The interval over which the SAS is valid, including the start time and expiry time.
12+
- The interval over which the SAS is valid, which includes the start time and expiry time.
1313
- The permissions granted by the SAS. For example, a SAS for an Event Hubs namespace might grant the listen permission, but not the send permission.
1414
- Only clients that present valid credentials can send data to an event hub.
1515
- A client can't impersonate another client.
@@ -24,7 +24,7 @@ This article covers authenticating the access to Event Hubs resources using SAS.
2424
2525

2626
## Configuring for SAS authentication
27-
You can configure the EventHubs shared access authorization rule on an Event Hubs namespace, or an entity (event hub instance or Kafka Topic in an event hub). Configuring a shared access authorization rule on a consumer group is currently not supported, but you can use rules configured on a namespace or entity to secure access to consumer group.
27+
You can configure a shared access authorization rule on an Event Hubs namespace, or an entity (event hub instance or Kafka Topic in an event hub). Configuring a shared access authorization rule on a consumer group is currently not supported, but you can use rules configured on a namespace or entity to secure access to consumer group.
2828

2929
The following image shows how the authorization rules apply on sample entities.
3030

@@ -34,13 +34,13 @@ In this example, the sample Event Hubs namespace (ExampleNamespace) has two enti
3434

3535
The manageRuleNS, sendRuleNS, and listenRuleNS authorization rules apply to both event hub instance eh1 and topic t1. The listenRule-eh and sendRule-eh authorization rules apply only to event hub instance eh1 and sendRuleT authorization rule applies only to topic topic1.
3636

37-
When using sendRuleNS authorization rule, client applications can send to both eh1 and topic1. When sendRuleT authorization rule is used, it enforces granular access to topic1 only and hence client applications using this rule for access now cannot send to eh1, but only to topic1.
37+
When you use sendRuleNS authorization rule, client applications can send to both eh1 and topic1. When sendRuleT authorization rule is used, it enforces granular access to topic1 only and hence client applications using this rule for access now can't send to eh1, but only to topic1.
3838

3939
## Generate a Shared Access Signature token
4040
Any client that has access to name of an authorization rule name and one of its signing keys can generate a SAS token. The token is generated by crafting a string in the following format:
4141

4242
- `se` – Token expiry instant. Integer reflecting seconds since epoch 00:00:00 UTC on 1 January 1970 (UNIX epoch) when the token expires
43-
- `skn` – Name of the authorization rule, that is the SAS key name.
43+
- `skn` – Name of the authorization rule, which is the SAS key name.
4444
- `sr` – URI of the resource being accessed.
4545
- `sig` – Signature.
4646

@@ -92,7 +92,7 @@ To use a policy name and a key value to connect to an event hub, use the `EventH
9292
const producer = new EventHubProducerClient("NAMESPACE NAME.servicebus.windows.net", eventHubName, new AzureNamedKeyCredential("POLICYNAME", "KEYVALUE"));
9393
```
9494

95-
You'll need to add a reference to `AzureNamedKeyCredential`.
95+
You need to add a reference to `AzureNamedKeyCredential`.
9696

9797
```javascript
9898
const { AzureNamedKeyCredential } = require("@azure/core-auth");
@@ -105,7 +105,7 @@ var token = createSharedAccessToken("https://NAMESPACENAME.servicebus.windows.ne
105105
const producer = new EventHubProducerClient("NAMESPACENAME.servicebus.windows.net", eventHubName, new AzureSASCredential(token));
106106
```
107107

108-
You'll need to add a reference to `AzureSASCredential`.
108+
You need to add a reference to `AzureSASCredential`.
109109

110110
```javascript
111111
const { AzureSASCredential } = require("@azure/core-auth");
@@ -269,7 +269,7 @@ For example, to define authorization rules scoped down to only sending/publishin
269269
To authenticate back-end applications that consume from the data generated by Event Hubs producers, Event Hubs token authentication requires its clients to either have the **manage** rights or the **listen** privileges assigned to its Event Hubs namespace or event hub instance or topic. Data is consumed from Event Hubs using consumer groups. While SAS policy gives you granular scope, this scope is defined only at the entity level and not at the consumer level. It means that the privileges defined at the namespace level or the event hub instance or topic level will be applied to the consumer groups of that entity.
270270

271271
## Disabling Local/SAS Key authentication
272-
For certain organizational security requirements, you may have to disable local/SAS key authentication completely and rely on the Azure Active Directory (Azure AD) based authentication which is the recommended way to connect with Azure Event Hubs. You can disable local/SAS key authentication at the Event Hubs namespace level using Azure portal or Azure Resource Manager template.
272+
For certain organizational security requirements, you may have to disable local/SAS key authentication completely and rely on the Azure Active Directory (Azure AD) based authentication, which is the recommended way to connect with Azure Event Hubs. You can disable local/SAS key authentication at the Event Hubs namespace level using Azure portal or Azure Resource Manager template.
273273

274274
### Disabling Local/SAS Key authentication via the portal
275275
You can disable local/SAS key authentication for a given Event Hubs namespace using the Azure portal.

0 commit comments

Comments
 (0)