Service Bus Authentication and Authorization
Updated: January 22, 2014
Applications can authenticate to Windows Azure Service Bus using either Shared Access Signature (SAS) authentication, or by authenticating through the Windows Azure Active Directory Access Control (also known as Access Control Service or ACS).
Shared Access Signature authentication enables applications to authenticate to Service Bus using an access key configured on the namespace, or on the entity with which specific rights are associated. You can then use this key to generate a Shared Access Signature token that clients can use to authenticate to Service Bus.
ACS provides federation with various standards-based identity providers. ACS federates with enterprise directories such as Active Directory Federation Services (ADFS) and web identities. These identities include Microsoft accounts (Windows Live IDs), Google, Yahoo!, and Facebook.
SAS provides a simple, flexible, and easy-to-use authentication scheme for Service Bus. Applications can use SAS in scenarios in which they do not need to manage the notion of an authorized “user.”
Applications that require a rich, identity-based authentication can use ACS for authenticating to Service Bus.
Shared Access Signature Authentication
SAS authentication enables you to grant a user granular access to Service Bus resources with specific rights. SAS authentication in Service Bus involves the configuration of a cryptographic key with associated rights on a Service Bus resource. Clients can then gain access to that resource by presenting a SAS token which consists of the resource URI being accessed and an expiry signed with the configured key.
You can configure keys for SAS on a Service Bus namespace. The key applies to all messaging entities in that namespace. You can also configure keys on Service Bus queues, topics, and notification hubs. Support for Service Bus relays will be added in the near future.
|Service Bus Notification Hubs are currently in pre-release and are expected to transition to general availability in midyear 2013. For more information, see Service Bus Push Notifications.|
To use SAS, you can configure a SharedAccessAuthorizationRule object on a namespace, queue, topic, or notification hub that consists of the following:
KeyName that identifies the rule.
PrimaryKey is a cryptographic key used to sign/validate SAS tokens.
SecondaryKey is a cryptographic key used to sign/validate SAS tokens.
Rights representing the collection of Listen, Send, or Manage rights granted.
Authorization rules configured at the namespace level can grant access to all entities in a namespace for clients with tokens signed using the corresponding key. Up to 12 such authorization rules can be configured on a Service Bus namespace, queue, topic, or notification hub. By default, a SharedAccessAuthorizationRule with all rights is configured for every namespace when it is first provisioned.
To access an entity, the client requires a SAS token generated using a specific SharedAccessAuthorizationRule. The SAS token is generated using the HMAC-SHA256 of a resource string that consists of the resource URI to which access is claimed, and an expiry with a cryptographic key associated with the authorization rule.
SAS authentication support for Service Bus is included in the Windows Azure .NET SDK versions 2.0 and later. SAS includes support for a SharedAccessAuthorizationRule. All APIs that accept a connection string as a parameter include support for SAS connection strings.
For more information, see
Service Bus authentication through ACS is managed through a companion “-sb” ACS namespace. For every Service Bus namespace, such as
contoso.servicebus.windows.net, a companion ACS namespace, such as
contoso-sb.accesscontrol.windows.net, is provisioned by default. A default service identity “owner,” with all rights, is provisioned by default in this companion ACS namespace. You can obtain fine-grained control to any Service Bus entity through ACS by configuring the appropriate trust relationships. You can configure additional service identities for managing access to Service Bus entities.
To access an entity, the client requests an SWT token from ACS with the appropriate claims by presenting its credentials. The SWT token must then be sent as a part of the request to Service Bus to enable the authorization of the client for access to the entity.
ACS authentication support for Service Bus is included in the Windows Azure .NET SDK versions 2.0 and later. This authentication includes support for a SharedSecretTokenProvider. All APIs that accept a connection string as a parameter include support for ACS connection strings.
For more information, see