You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/authorize-access-azure-active-directory.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,18 @@
1
1
---
2
-
title: Authorize access with Microsoft Entra ID
3
-
description: This article provides information on authorizing access to Event Hubs resources using Microsoft Entra ID.
2
+
title: Authorize Azure Event Hubs Access With Microsoft Entra ID
3
+
description: Learn how to authorize access to Azure Event Hubs resources using Microsoft Entra ID with Azure role-based access control (RBAC) for secure authentication and permissions.
4
+
#customer intent: As a cloud security administrator, I want to configure Microsoft Entra ID authentication for Event Hubs resources so that I can implement secure role-based access control instead of using shared access keys.
4
5
ms.topic: concept-article
5
-
ms.date: 06/26/2024
6
-
#customer intent: As an Azure Event Hubs user, I want to know how to authorize requests to event hubs using Microsoft Entra ID.
6
+
ms.date: 07/25/2025
7
+
ms.custom:
8
+
- ai-gen-docs-bap
9
+
- ai-gen-title
10
+
- ai-seo-date:07/25/2025
11
+
- ai-gen-description
7
12
---
8
13
9
-
# Authorize access to Event Hubs resources using Microsoft Entra ID
10
-
Azure Event Hubs supports using Microsoft Entra ID to authorize requests to Event Hubs resources. With Microsoft Entra ID, you can use Azure role-based access control (RBAC) to grant permissions to a security principal, which can be a user, or an application service principal. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
14
+
# Authorize access to Azure Event Hubs resources using Microsoft Entra ID
15
+
Azure Event Hubs supports using Microsoft Entra ID to authorize requests to Event Hubs resources, providing secure authentication and granular access control. With Microsoft Entra ID, you can use Azure role-based access control (RBAC) to grant permissions to security principals, including users and application service principals. This approach eliminates the need for shared access keys and provides better security for your Event Hubs implementations. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
11
16
12
17
## Overview
13
18
When a security principal (a user, or an application) attempts to access an Event Hubs resource, the request must be authorized. With Microsoft Entra ID, access to a resource is a two-step process.
@@ -26,7 +31,7 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
26
31
27
32
When an Azure role is assigned to a Microsoft Entra security principal, Azure grants access to those resources for that security principal. Access can be scoped to the level of subscription, the resource group, the Event Hubs namespace, or any resource under it. A Microsoft Entra security principal can be a user, or an application service principal, or a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
28
33
29
-
## Azure built-in roles for Azure Event Hubs
34
+
## Azure built-in roles for Event Hubs
30
35
Azure provides the following Azure built-in roles for authorizing access to Event Hubs data using Microsoft Entra ID and OAuth:
0 commit comments