Skip to content

Commit 2926692

Browse files
authored
Added more info for least privilege in SC
1 parent df75c01 commit 2926692

File tree

1 file changed

+17
-12
lines changed

1 file changed

+17
-12
lines changed

servicecontrol/configure-non-privileged-service-account.md

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configuring a Non-Privileged Account
33
summary: Using a low privilege account for ServiceControl
4-
reviewed: 2024-07-17
4+
reviewed: 2025-07-11
55
---
66

77
To use a low-privileged accounts for ServiceControl instances, the following should be considered:
@@ -10,31 +10,36 @@ To use a low-privileged accounts for ServiceControl instances, the following sho
1010

1111
The transport connection string used by ServiceControl must enable access to all of the ServiceControl queues as configured by the `InstanceName` setting:
1212

13-
* [ServiceControl/InstanceName](/servicecontrol/servicecontrol-instances/configuration.md) <!-- TODO: Add the InstanceName setting and link -->
14-
* [ServiceControl.Audit/InstanceName](/servicecontrol/audit-instances/configuration.md) <!-- TODO: Add the InstanceName setting and link -->
15-
* [ServiceControl.Monitoring/InstanceName](/servicecontrol/monitoring-instances/configuration.md) <!-- TODO: Add the InstanceName setting and link -->
13+
* [ServiceControl/InstanceName](/servicecontrol/servicecontrol-instances/configuration.md#host-settings-servicecontrolinstancename)
14+
* [ServiceControl.Audit/InstanceName](/servicecontrol/audit-instances/configuration.md#host-settings-servicecontrol-auditinstancename)
15+
* [ServiceControl.Monitoring/InstanceName](/servicecontrol/monitoring-instances/configuration.md#host-settings-monitoringinstancename)
1616

1717
The queues that ServiceControl needs to access will reflect the `InstanceName` used and the [instance type](/servicecontrol/#servicecontrol-instance-types):
1818

19+
> [!WARNING]
20+
> If the connection string does not provide appropriate rights, the service may fail to start or may experience errors when certain operations are performed.
21+
1922
### All instance types:
2023

21-
* `{InstanceName}`
24+
Both read and send permissions are required for each of these queues:
25+
26+
* `{InstanceName}`:
2227
* `{InstanceName}.errors`
2328
* `{InstanceName}.timeouts` (only when using [MSMQ](/servicecontrol/transports.md#msmq))
2429
* `{InstanceName}.timeoutsdispatcher` (only when using [MSMQ](/servicecontrol/transports.md#msmq))
2530

2631
### [Error instances](/servicecontrol/servicecontrol-instances/):
2732

28-
* `{InstanceName}.staging`
29-
* `error` (see the [`ServiceBus/ErrorQueue`](/servicecontrol/servicecontrol-instances/configuration.md#transport-servicebuserrorqueue) setting)
30-
* `error.log` (optional, see the [`ServiceBus/ErrorLogQueue`](/servicecontrol/servicecontrol-instances/configuration.md#transport-servicebuserrorlogqueue) setting)
33+
* `{InstanceName}.staging`: Both read and send permissions are required.
34+
* `error` (see the [`ServiceBus/ErrorQueue`](/servicecontrol/servicecontrol-instances/configuration.md#transport-servicebuserrorqueue) setting): Read permission is required.
35+
* `error.log` (optional, see the [`ServiceBus/ErrorLogQueue`](/servicecontrol/servicecontrol-instances/configuration.md#transport-servicebuserrorlogqueue) setting): Send permission is required.
36+
* The Error instance will require send permission for every endpoint queue to allow for [failed message retries](https://docs.particular.net/servicepulse/intro-failed-messages).
37+
* If subscribing to [ServiceControl integration events](https://docs.particular.net/servicecontrol/contracts), send/publish permission to the subscriber queues and/or any pub/sub mechanism for the transport will be required.
3138

3239
### [Audit instances](/servicecontrol/audit-instances/):
3340

34-
* `audit` (see the [`ServiceBus/AuditQUeue`](/servicecontrol/audit-instances/configuration.md#transport-servicebusauditqueue) setting)
35-
* `audit.log` (optional, see the [`ServiceBus/AuditLogQueue`](/servicecontrol/audit-instances/configuration.md#transport-servicebusauditlogqueue) setting)
36-
37-
If the connection string does not provide appropriate rights, the service will fail to start.
41+
* `audit` (see the [`ServiceBus/AuditQueue`](/servicecontrol/audit-instances/configuration.md#transport-servicebusauditqueue) setting): Read permission is required.
42+
* `audit.log` (optional, see the [`ServiceBus/AuditLogQueue`](/servicecontrol/audit-instances/configuration.md#transport-servicebusauditlogqueue) setting): Send permission is required.
3843

3944
> [!NOTE]
4045
> For [MSMQ](/servicecontrol/transports.md#msmq), the ACL default for a queue allows Administrators full access. Switching to a low-privileged account requires modification of rights to give full control to the custom account.

0 commit comments

Comments
 (0)