Eksporter (0) Skriv ut
Vis alt
EN
Dette innholdet er ikke tilgjengelig på ditt språk, men her er den engelske versjonen.

How to: Set Security and Authentication on a Service Bus Application

Updated: June 18, 2014

This topic discusses how to authenticate a service and client application using Microsoft Azure Service Bus. For more information about setting transport and message-level security, see Securing and Authenticating a Service Bus Connection, and also the Securing Services topic in the Windows Communication Foundation (WCF) documentation.

If you are developing a service, you must first determine what type of credentials you will use to authenticate with Service Bus, and whether a client that connects to your service must authenticate. All services are required to authenticate with the Service Bus, using SAML, shared secret, or a simple Web token. You may decide to have a different form of authentication for your service as you do for the client. For more information, see Choosing Authentication for a Service Bus Application.

If you are developing a client, determine what type of authentication credentials are required by the service to which you are connecting. This can be done in a variety of ways. This includes retrieving the information from the contract metadata. For more information, see How to: Design a WCF Service Contract for use with Service Bus.

To set Service Bus authentication with an App.config file

  1. Define a behavior that contains the specified <transportClientEndpointBehavior> element, and also the relevant credentials.

    The following code, from the WebHttp sample, shows how to declare and configure a shared secret credential.

    <behaviors>
      <endpointBehaviors>
        <behavior name="sharedSecretClientCredentials">
          <transportClientEndpointBehavior credentialType="SharedSecret">
            <clientCredentials>
              <sharedSecret issuerName="ISSUER_NAME" issuerSecret="ISSUER_SECRET" />
            </clientCredentials>
          </transportClientEndpointBehavior>
        </behavior>
      </endpointBehaviors>
    </behaviors>
    

    In this procedure, the issuer name and secret are held directly in the App.config file. It is recommended that you implement some form of security on any configuration file that contains such security information.

    Once you have defined the credentials in the App.config file, the application will use the security configuration automatically. There are no additional steps necessary.

To set Service Bus authentication programmatically

  1. Retrieve the security credentials:

    Console.Write("Your Issuer Name: ");
    string issuerName = Console.ReadLine();
    Console.Write("Your Issuer Secret: ");
    string issuerSecret = Console.ReadLine();
    

    As is common in the Service Bus samples, this procedure has the issuer name and secret known by the user, and they are typed in directly.

  2. Create the credential endpoint behavior object that contains the security credentials:

    TransportClientEndpointBehavior sharedSecretServiceBusCredential = new TransportClientEndpointBehavior();
    sharedSecretServiceBusCredential.CredentialType = TransportClientCredentialType.SharedSecret;
    sharedSecretServiceBusCredential.Credentials.SharedSecret.IssuerName = issuerName;
    sharedSecretServiceBusCredential.Credentials.SharedSecret.IssuerSecret = issuerSecret;
    
  3. Create the channel factory to connect to the endpoint:

    ChannelFactory<IEchoChannel> channelFactory = new ChannelFactory<IEchoChannel>("RelayEndpoint", new EndpointAddress(serviceUri));
    
  4. Apply the credentials to the channel factory:

    channelFactory.Endpoint.Behaviors.Add(sharedSecretServiceBusCredential);
    

    Once you have applied the credentials to the channel factory, you can open a connection to the endpoint and access Service Bus.

Fellesskapsinnhold

Legg til
Vis:
© 2014 Microsoft