Hello Suki Azure,
Thank you for posting your question in the Microsoft Q&A forum.
To enable secure access from Tenant B to Event Hub in Tenant A while routing traffic through Azure Firewall, consider a DNS-based forwarding approach with SNI preservation. Assign a custom public FQDN (e.g., eventhub-proxy.contoso.com) to Azure Firewall’s public IP and configure Layer 7 application rules (not DNAT) to forward traffic to Event Hub’s original FQDN (namespace.servicebus.windows.net) while preserving the TLS handshake. This ensures certificate validation succeeds without exposing Event Hub directly.
If SNI preservation is insufficient, deploy a reverse proxy (Nginx/HAProxy) behind Azure Firewall to terminate and re-encrypt TLS while rewriting the Host header. For enhanced security, combine this with IP whitelisting, SAS token authentication, and Azure Sentinel logging. While Private Link or ExpressRoute would be ideal, they are ruled out here making DNS-based routing with Azure Firewall the most viable option. Always validate performance impact and compliance requirements before implementation.
For detailed guidance, refer to Microsoft’s documentation below:
https://learn.microsoft.com/en-us/azure/firewall/features#application-fqdn-filtering
https://learn.microsoft.com/en-us/security/benchmark/azure/baselines/event-hubs-security-baseline
If the above answer helped, please do not forget to "Accept Answer" as this may help other community members to refer the info if facing a similar issue. Your contribution to the Microsoft Q&A community is highly appreciated.