We have covered some topics regarding working with and developing applications using Azure Event Hub – now it is time to learn something more about the security features of this service. In the previous part of this chapter, you used shared access policies, which are the easiest options when you want to restrict access to a hub to some predefined operations (such as listening to events, sending them, or managing Event Hub). Now I will show you something more about the security model and restricting access to the whole namespace by IP filtering.
Azure Event Hub security
Event publishers
When creating an Event Hub namespace instance, you had to choose a tier – you could choose between Basic and Standard tier. Besides...