Skip to content

Commit d8f5a38

Browse files
committed
freshness review & update
1 parent 18bea7e commit d8f5a38

File tree

3 files changed

+9
-19
lines changed

3 files changed

+9
-19
lines changed

articles/event-hubs/authenticate-application.md

Lines changed: 9 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Authenticate an application to access Azure Event Hubs resources
33
description: This article provides information about authenticating an application with Azure Active Directory to access Azure Event Hubs resources
44
ms.topic: conceptual
5-
ms.date: 06/14/2021
5+
ms.date: 11/08/2022
66
ms.custom: subject-rbac-steps
77
---
88

@@ -35,32 +35,21 @@ The following sections show you how to configure your native application or web
3535
For an overview of the OAuth 2.0 code grant flow, see [Authorize access to Azure Active Directory web applications using the OAuth 2.0 code grant flow](../active-directory/develop/v2-oauth2-auth-code-flow.md).
3636

3737
### Register your application with an Azure AD tenant
38-
The first step in using Azure AD to authorize Event Hubs resources is registering your client application with an Azure AD tenant from the [Azure portal](https://portal.azure.com/). When you register your client application, you supply information about the application to AD. Azure AD then provides a client ID (also called an application ID) that you can use to associate your application with Azure AD runtime. To learn more about the client ID, see [Application and service principal objects in Azure Active Directory](../active-directory/develop/app-objects-and-service-principals.md).
38+
The first step in using Azure AD to authorize Event Hubs resources is registering your client application with an Azure AD tenant from the [Azure portal](https://portal.azure.com/). Follow steps in the [Quickstart: Register an application with the Microsoft identity platform](../active-directory/develop/quickstart-register-app.md) to register an application in Azure AD that represents your application trying to access Event Hubs resources.
3939

40-
The following images show steps for registering a web application:
40+
When you register your client application, you supply information about the application to AD. Azure AD then provides a client ID (also called an application ID) that you can use to associate your application with Azure AD runtime. To learn more about the client ID, see [Application and service principal objects in Azure Active Directory](../active-directory/develop/app-objects-and-service-principals.md).
4141

42-
![Register an application](./media/authenticate-application/app-registrations-register.png)
4342

4443
> [!Note]
4544
> If you register your application as a native application, you can specify any valid URI for the Redirect URI. For native applications, this value does not have to be a real URL. For web applications, the redirect URI must be a valid URI, because it specifies the URL to which tokens are provided.
4645
4746
After you've registered your application, you'll see the **Application (client) ID** under **Settings**:
4847

49-
![Application ID of the registered application](./media/authenticate-application/application-id.png)
50-
51-
For more information about registering an application with Azure AD, see [Integrating applications with Azure Active Directory](../active-directory/develop/quickstart-register-app.md).
48+
:::image type="content" source="./media/authenticate-application/application-id.png" alt-text="Screenshot showing the app registration page with application ID highlighted.":::
5249

5350

5451
### Create a client secret
55-
The application needs a client secret to prove its identity when requesting a token. To add the client secret, follow these steps.
56-
57-
1. Navigate to your app registration in the Azure portal.
58-
1. Select the **Certificates & secrets** setting.
59-
1. Under **Client secrets**, select **New client secret** to create a new secret.
60-
1. Provide a description for the secret, and choose the wanted expiration interval.
61-
1. Immediately copy the value of the new secret to a secure location. The fill value is displayed to you only once.
62-
63-
![Client secret](./media/authenticate-application/client-secret.png)
52+
The application needs a client secret to prove its identity when requesting a token. Follow steps from [Add a client secret](../active-directory/develop/quickstart-register-app.md#add-a-client-secret) to create a client secret for your app in Azure AD.
6453

6554

6655
## Assign Azure roles using the Azure portal
@@ -72,15 +61,16 @@ Once you define the role and its scope, you can test this behavior with samples
7261
### Client libraries for token acquisition
7362
Once you've registered your application and granted it permissions to send/receive data in Azure Event Hubs, you can add code to your application to authenticate a security principal and acquire OAuth 2.0 token. To authenticate and acquire the token, you can use either one of the [Microsoft identity platform authentication libraries](../active-directory/develop/reference-v2-libraries.md) or another open-source library that supports OpenID or Connect 1.0. Your application can then use the access token to authorize a request against Azure Event Hubs.
7463

75-
For a list of scenarios for which acquiring tokens is supported, see the [Scenarios](https://aka.ms/msal-net-scenarios) section of the [Microsoft Authentication Library (MSAL) for .NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) GitHub repository.
64+
For scenarios where acquiring tokens is supported, see the [Scenarios](https://aka.ms/msal-net-scenarios) section of the [Microsoft Authentication Library (MSAL) for .NET](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) GitHub repository.
7665

7766
## Samples
67+
- [Azure.Messaging.EventHubs samples](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Azure.Messaging.EventHubs/ManagedIdentityWebApp)
68+
69+
This sample has been updated to use the latest **Azure.Messaging.EventHubs** library.
7870
- [Microsoft.Azure.EventHubs samples](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Microsoft.Azure.EventHubs/Rbac).
7971

8072
These samples use the old **Microsoft.Azure.EventHubs** library, but you can easily update it to using the latest **Azure.Messaging.EventHubs** library. To move the sample from using the old library to new one, see the [Guide to migrate from Microsoft.Azure.EventHubs to Azure.Messaging.EventHubs](https://github.com/Azure/azure-sdk-for-net/blob/master/sdk/eventhub/Azure.Messaging.EventHubs/MigrationGuide.md).
81-
- [Azure.Messaging.EventHubs samples](https://github.com/Azure/azure-event-hubs/tree/master/samples/DotNet/Azure.Messaging.EventHubs/ManagedIdentityWebApp)
8273

83-
This sample has been updated to use the latest **Azure.Messaging.EventHubs** library.
8474

8575
## Next steps
8676
- To learn more about Azure RBAC, see [What is Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md)?
Binary file not shown.
9.4 KB
Loading

0 commit comments

Comments
 (0)