Skip to content

Commit fb8e3d7

Browse files
committed
Freshness
1 parent 7958e32 commit fb8e3d7

File tree

1 file changed

+12
-7
lines changed

1 file changed

+12
-7
lines changed

articles/event-hubs/authorize-access-azure-active-directory.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
---
2-
title: Authorize access with Microsoft Entra ID
3-
description: This article provides information on authorizing access to Event Hubs resources using Microsoft Entra ID.
2+
title: Authorize Azure Event Hubs Access With Microsoft Entra ID
3+
description: Learn how to authorize access to Azure Event Hubs resources using Microsoft Entra ID with Azure role-based access control (RBAC) for secure authentication and permissions.
4+
#customer intent: As a cloud security administrator, I want to configure Microsoft Entra ID authentication for Event Hubs resources so that I can implement secure role-based access control instead of using shared access keys.
45
ms.topic: concept-article
5-
ms.date: 06/26/2024
6-
#customer intent: As an Azure Event Hubs user, I want to know how to authorize requests to event hubs using Microsoft Entra ID.
6+
ms.date: 07/25/2025
7+
ms.custom:
8+
- ai-gen-docs-bap
9+
- ai-gen-title
10+
- ai-seo-date:07/25/2025
11+
- ai-gen-description
712
---
813

9-
# Authorize access to Event Hubs resources using Microsoft Entra ID
10-
Azure Event Hubs supports using Microsoft Entra ID to authorize requests to Event Hubs resources. With Microsoft Entra ID, you can use Azure role-based access control (RBAC) to grant permissions to a security principal, which can be a user, or an application service principal. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
14+
# Authorize access to Azure Event Hubs resources using Microsoft Entra ID
15+
Azure Event Hubs supports using Microsoft Entra ID to authorize requests to Event Hubs resources, providing secure authentication and granular access control. With Microsoft Entra ID, you can use Azure role-based access control (RBAC) to grant permissions to security principals, including users and application service principals. This approach eliminates the need for shared access keys and provides better security for your Event Hubs implementations. To learn more about roles and role assignments, see [Understanding the different roles](../role-based-access-control/overview.md).
1116

1217
## Overview
1318
When a security principal (a user, or an application) attempts to access an Event Hubs resource, the request must be authorized. With Microsoft Entra ID, access to a resource is a two-step process.
@@ -26,7 +31,7 @@ Microsoft Entra authorizes access rights to secured resources through [Azure rol
2631

2732
When an Azure role is assigned to a Microsoft Entra security principal, Azure grants access to those resources for that security principal. Access can be scoped to the level of subscription, the resource group, the Event Hubs namespace, or any resource under it. A Microsoft Entra security principal can be a user, or an application service principal, or a [managed identity for Azure resources](../active-directory/managed-identities-azure-resources/overview.md).
2833

29-
## Azure built-in roles for Azure Event Hubs
34+
## Azure built-in roles for Event Hubs
3035
Azure provides the following Azure built-in roles for authorizing access to Event Hubs data using Microsoft Entra ID and OAuth:
3136

3237
| Role | Description |

0 commit comments

Comments
 (0)