Can IAM permission be given to Service Bus with Local authentication

curious7 271 Reputation points
2025-09-25T09:27:44.8566667+00:00

If I have a Service Bus with queues in it and it has local authentication enabled. Can I give some users (using their on-premises synced account) the "Azure Service Bus Data Receiver" and "Azure Service Bus Data Sender" permission to allow them to see messages in the queue by using "Service Bus Explorer" in the Azure portal??

 

They have Reader role on the parent Resource group so they can already see the Service Bus but can't access queues.

 

Or IAM permissions won't work if the Service bus has local authentication enabled. Also, how can I use Application insights or other tools to troubleshoot a webapp that is supposed to be pulling messages from this queue but is not and thus the messages are ending in dead letter queue after X number of tries.

Azure Service Bus
Azure Service Bus
An Azure service that provides cloud messaging as a service and hybrid integration.
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Anurag Rohikar 2,785 Reputation points Microsoft External Staff Moderator
    2025-09-25T10:40:42.5966667+00:00

    Hello curious7,

    Yes, you can grant Azure RBAC roles such as "Azure Service Bus Data Receiver" and "Azure Service Bus Data Sender" to your synced users, even if local authentication is still enabled.

    How it works

    • Assign Data Roles: Grant the required Data Receiver/Sender roles at the Service Bus namespace or specific queue/topic scope.
    • Authentication Path: When users access Service Bus Explorer in the Azure Portal, it always authenticates them via their Microsoft Entra ID (Azure AD) identity. In this case, the portal checks the user’s RBAC permissions and allows sending/receiving messages if the correct data roles are assigned. This flow is independent of Shared Access Signatures (SAS).
    • Reader Role Limitation: The Reader role on the Resource Group only provides management plane access (viewing resources, properties, etc.), not data plane access (sending, receiving, or peeking messages). For data operations, the Service Bus–specific Data roles are required.

    Best practice:

    While RBAC works even if local authentication is enabled, the recommended approach is to disable local authentication. This removes connection string/SAS key access and ensures that only Entra ID + RBAC are used for secure access.

    • Action: Navigate to the Service Bus Namespace → Local Authentication → set to Disabled.
    • Result: Enforces a single, secure path for data access using Entra ID identities and RBAC roles.

    References:

    Hope this helps. Please do let us know if you have any further doubts. Thank you!


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.