Security
Clients access Service Bus resources by presenting an access token. The token specifies the URI to be accessed and an expiry time of the token.
Note
The Service Bus Namespace owner account (RootManageSharedAccessKey
) should not be shared or embedded in code. This is a highly privileged account that gives rights to delete and create Azure artifacts and should only be used for administrative tasks.
There are two options available for clients to be authenticated to allow access to the Service Bus:
Shared Access Signature (SAS): This provides authentication using a shared key configured on the namespace or on a Service Bus entity (Queues, Topics, and Subscriptions) with specific rights for listening, sending, or managing. The key is then used to generate a SAS token, which the client uses to authenticate with the Service Bus.
Access Control Service (ACS): This provides identity federation with various providers. To access the Service Bus entities, the client requests a Simple Web Token...