Hello curious7,
Yes, you can grant Azure RBAC roles such as "Azure Service Bus Data Receiver" and "Azure Service Bus Data Sender" to your synced users, even if local authentication is still enabled.
How it works
- Assign Data Roles: Grant the required Data Receiver/Sender roles at the Service Bus namespace or specific queue/topic scope.
- Authentication Path: When users access Service Bus Explorer in the Azure Portal, it always authenticates them via their Microsoft Entra ID (Azure AD) identity. In this case, the portal checks the user’s RBAC permissions and allows sending/receiving messages if the correct data roles are assigned. This flow is independent of Shared Access Signatures (SAS).
- Reader Role Limitation: The Reader role on the Resource Group only provides management plane access (viewing resources, properties, etc.), not data plane access (sending, receiving, or peeking messages). For data operations, the Service Bus–specific Data roles are required.
Best practice:
While RBAC works even if local authentication is enabled, the recommended approach is to disable local authentication. This removes connection string/SAS key access and ensures that only Entra ID + RBAC are used for secure access.
- Action: Navigate to the Service Bus Namespace → Local Authentication → set to Disabled.
- Result: Enforces a single, secure path for data access using Entra ID identities and RBAC roles.
References:
- Azure Service Bus authentication and authorization
- Authenticate access to Azure Service Bus resources using Microsoft Entra ID
- Azure role-based access control for Service Bus
- Disable local authentication in Service Bus
Hope this helps. Please do let us know if you have any further doubts. Thank you!