Atlan supports the following authentication methods for Microsoft Azure Event Hubs:
- SAS key — this method uses a connection string-primary key to fetch metadata.
- Service principal — in addition to a connection string-primary key, this method requires a client ID, client secret, and tenant ID to fetch metadata.
SAS key authentication
Create a shared access signature policy
You will need to create a shared access signature (SAS) policy in Microsoft Azure Event Hubs for authentication in Atlan.
The Manage permission is required for the following:
- Atlan requires read permissions of the configurations set to event hubs and the event hub namespace. Since Atlan currently only supports SAS policy-based authentication, Manage permission is required to provide this type of access. SAS policies do not support granular access control while Send or Listen permission is insufficient to crawl configuration metadata. Granular permissions will only be available once Atlan supports other authentication methods that allow for the granular access control capabilities of Microsoft Azure.
- To fetch the Azure Event Hub status attribute and Azure Event Hub consumer group assets through the Azure APIs.
To create a SAS policy for crawling Microsoft Azure Event Hubs:
- Log in to the Azure portal.
- Open the menu and search for or click Event Hubs.
- On the Event Hubs page, click the namespace of your event hub. Copy your Event Hubs Namespace to use for authentication in Atlan.
- In the left menu of your event hub namespace, under Settings, click Shared access policies.
- On the Shared access policies page, click + Add to add a new SAS policy.
- In the Add SAS policy sidebar, enter the following details:
- For Policy name, enter a meaningful name — for example,
Atlan integration policy
. - To add the Manage permission to your SAS policy, click Manage.
- Click Create to finish setup.
- For Policy name, enter a meaningful name — for example,
- On the Shared access policies page, select the newly created SAS policy.
- From the corresponding SAS Policy dialog, under Connection string-primary key, click the clipboard icon to copy the connection string-primary key and store it in a secure location.
You will need your event hub namespace and the connection string-primary key for crawling Microsoft Azure Event Hubs.
Service principal authentication
You will need the following to authenticate the connection in Atlan:
- Connection string-primary key — required to crawl Kafka assets
- Client ID (application ID), client secret, and tenant ID (directory ID) — required to crawl Microsoft Azure Event Hubs assets
Create a shared access signature policy
Follow the steps in Create a shared access signature policy to generate a connection string-primary key for crawling Microsoft Azure Event Hubs.
Register app with Microsoft Entra ID
You will need to register your service principal application with Microsoft Entra ID and note down the values of the tenant ID, client ID, and client secret.
To register your app with Microsoft Entra ID:
- Log in to the Azure portal.
- In the search bar, search for Microsoft Entra ID and select it from the dropdown list.
- From the left menu of the Microsoft Entra ID page, click App registrations.
- From the toolbar on the App registrations page, click + New registration.
- On the Register an application page, for Name, enter a name for your service principal application and then click Register.
- On the homepage of your newly created application, from the Overview screen, copy the values for the following fields and store them in a secure location:
- Application (client) ID
- Directory (tenant) ID
- From the left menu of your newly created application page, click Certificates & secrets.
- On the Certificates & secrets page, under Client secrets, click + New client secret.
- In the Add a client secret screen, enter the following details:
- For Description, enter a description for your client secret.
- For Expiry, select when the client secret will expire.
- Click Add.
- On the Certificates & secrets page, under Client secrets, for the newly created client secret, click the clipboard icon to copy the Value and store it in a secure location.
Add app to Event Hubs Data Sender role
You will need to add the service principal application created in the previous step to the Azure Event Hubs Data Sender role.
To add a service principal to the Azure Event Hubs Data Sender role:
- Log in to the Azure portal.
- Open the menu and search for or click Event Hubs.
- On the Event Hubs page, click the namespace of your event hub.
- From the left menu of your event hubs namespace page, click Access Control (IAM).
- In the upper right of the Access Control (IAM) page, navigate to the Add a role assignment tile and then click Add.
- On the Add a role assignment page, enter the following details:
- For Role, click the dropdown to select Azure Event Hubs Data Sender — this allows send access to Azure Event Hubs resources.
- For Assign access to, click the dropdown to select Azure AD user, group, or service principal.
- For Select, choose the service principal application you created in the previous step.
- Click Save to save your role assignment.