You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Authenticate access to Event Hubs resources using shared access signatures (SAS)
10
10
Shared access signature (SAS) gives you granular control over the type of access you grant to the clients who has the shared access signature. Here are some of the controls you can set in a SAS:
11
11
12
-
- The interval over which the SAS is valid, including the start time and expiry time.
12
+
- The interval over which the SAS is valid, which includes the start time and expiry time.
13
13
- The permissions granted by the SAS. For example, a SAS for an Event Hubs namespace might grant the listen permission, but not the send permission.
14
14
- Only clients that present valid credentials can send data to an event hub.
15
15
- A client can't impersonate another client.
@@ -24,7 +24,7 @@ This article covers authenticating the access to Event Hubs resources using SAS.
24
24
25
25
26
26
## Configuring for SAS authentication
27
-
You can configure the EventHubs shared access authorization rule on an Event Hubs namespace, or an entity (event hub instance or Kafka Topic in an event hub). Configuring a shared access authorization rule on a consumer group is currently not supported, but you can use rules configured on a namespace or entity to secure access to consumer group.
27
+
You can configure a shared access authorization rule on an Event Hubs namespace, or an entity (event hub instance or Kafka Topic in an event hub). Configuring a shared access authorization rule on a consumer group is currently not supported, but you can use rules configured on a namespace or entity to secure access to consumer group.
28
28
29
29
The following image shows how the authorization rules apply on sample entities.
30
30
@@ -34,13 +34,13 @@ In this example, the sample Event Hubs namespace (ExampleNamespace) has two enti
34
34
35
35
The manageRuleNS, sendRuleNS, and listenRuleNS authorization rules apply to both event hub instance eh1 and topic t1. The listenRule-eh and sendRule-eh authorization rules apply only to event hub instance eh1 and sendRuleT authorization rule applies only to topic topic1.
36
36
37
-
When using sendRuleNS authorization rule, client applications can send to both eh1 and topic1. When sendRuleT authorization rule is used, it enforces granular access to topic1 only and hence client applications using this rule for access now cannot send to eh1, but only to topic1.
37
+
When you use sendRuleNS authorization rule, client applications can send to both eh1 and topic1. When sendRuleT authorization rule is used, it enforces granular access to topic1 only and hence client applications using this rule for access now can't send to eh1, but only to topic1.
38
38
39
39
## Generate a Shared Access Signature token
40
40
Any client that has access to name of an authorization rule name and one of its signing keys can generate a SAS token. The token is generated by crafting a string in the following format:
41
41
42
42
-`se` – Token expiry instant. Integer reflecting seconds since epoch 00:00:00 UTC on 1 January 1970 (UNIX epoch) when the token expires
43
-
-`skn` – Name of the authorization rule, that is the SAS key name.
43
+
-`skn` – Name of the authorization rule, which is the SAS key name.
44
44
-`sr` – URI of the resource being accessed.
45
45
-`sig` – Signature.
46
46
@@ -92,7 +92,7 @@ To use a policy name and a key value to connect to an event hub, use the `EventH
@@ -269,7 +269,7 @@ For example, to define authorization rules scoped down to only sending/publishin
269
269
To authenticate back-end applications that consume from the data generated by Event Hubs producers, Event Hubs token authentication requires its clients to either have the **manage** rights or the **listen** privileges assigned to its Event Hubs namespace or event hub instance or topic. Data is consumed from Event Hubs using consumer groups. While SAS policy gives you granular scope, this scope is defined only at the entity level and not at the consumer level. It means that the privileges defined at the namespace level or the event hub instance or topic level will be applied to the consumer groups of that entity.
270
270
271
271
## Disabling Local/SAS Key authentication
272
-
For certain organizational security requirements, you may have to disable local/SAS key authentication completely and rely on the Azure Active Directory (Azure AD) based authentication which is the recommended way to connect with Azure Event Hubs. You can disable local/SAS key authentication at the Event Hubs namespace level using Azure portal or Azure Resource Manager template.
272
+
For certain organizational security requirements, you may have to disable local/SAS key authentication completely and rely on the Azure Active Directory (Azure AD) based authentication, which is the recommended way to connect with Azure Event Hubs. You can disable local/SAS key authentication at the Event Hubs namespace level using Azure portal or Azure Resource Manager template.
273
273
274
274
### Disabling Local/SAS Key authentication via the portal
275
275
You can disable local/SAS key authentication for a given Event Hubs namespace using the Azure portal.
0 commit comments