You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/create-standard-workflows-hybrid-deployment.md
+73-1Lines changed: 73 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ This how-to guide shows how to create and deploy a Standard logic app workflow u
37
37
- Managed identity authentication
38
38
- File System connector
39
39
40
-
-Although you can create connections for managed connectors in your workflow through Azure portal and Visual Studio Code, to set up authentication for managed connectors, [follow these steps to set up authentication in Visual Studio Code](azure-arc-enabled-logic-apps-create-deploy-workflows.md#set-up-connection-authentication).
40
+
-Azure Arc-enabled Kubernetes clusters currently don't support managed identity authentication for managed API connections. Instead, you must create your own app registration using Microsoft Entra ID. For more information, [follow these steps later in this guide](#authenticate-managed-api-connections).
41
41
42
42
- Some function-based triggers, such as Azure Blob, Cosmos DB, and Event Hubs require a connection to the Azure storage account associated with your Standard logic app. If you use any function-based triggers, in your Standard logic app's environment variables in the Azure portal or in your logic app project's **local.settings.json** file in Visual Studio Code, add the following app setting and provide your storage account connection string:
43
43
@@ -161,6 +161,78 @@ After you meet the prerequisites, but before you create your Standard logic app
161
161
162
162
1. Build your workflow as usual by adding a trigger and actions. For more information, see [Build a workflow with a trigger and actions](create-workflow-with-trigger-or-action.md).
To authenticate managed API connections in Standard logic app workflows hosted on Azure Arc-enabled Kubernetes clusters, you must create your own app registration using Microsoft Entra ID. You can then use this app registration's values as an identity with your Standard logic app resource to authenticate your API connections instead.
169
+
170
+
### Create an app registration with Microsoft Entra ID
171
+
172
+
#### [Portal](#tab/azure-portal)
173
+
174
+
1. In the [Azure portal](https://portal.azure.com), follow [Quickstart: Register an application with the Microsoft identity platform](/entra/identity-platform/quickstart-register-app) to create an app registration.
175
+
176
+
1. After creation completes, find your new app registration in the portal.
177
+
178
+
1. On the resource menu, select **Overview**, and save the following values, which you need later for connection authentication:
179
+
180
+
- Client ID
181
+
- Object ID
182
+
- Tenant ID
183
+
- Client secret
184
+
185
+
#### [Azure CLI](#tab/azure-cli)
186
+
187
+
1. To create the app registration, use the [**az ad sp create** command](/cli/azure/ad/sp#az-ad-sp-create).
188
+
189
+
1. To review all the properties, use the [**az ad sp show** command](/cli/azure/ad/sp#az-ad-sp-show).
190
+
191
+
1. In the output from both commands, find and save the the following values, which you need later for connection authentication:
192
+
193
+
- Client ID
194
+
- Object ID
195
+
- Tenant ID
196
+
- Client secret
197
+
198
+
---
199
+
200
+
### Add environment variable values to your Standard logic app
201
+
202
+
1. In the [Azure portal](https://portal.azure.com), go to your Standard logic app resource.
203
+
204
+
1. On the resource menu, under **Settings**, select **Containers**, and then select the **Environment variables** tab.
205
+
206
+
1. On the toolbar, select **Edit and deploy**.
207
+
208
+
1. On the **Edit a container** pane, select **Environment variables**, and then select **Add**.
209
+
210
+
1. From the following table, add each environment variable with the specified value:
@@ -241,12 +241,12 @@ To create your Azure Arc-enabled Kubernetes cluster, connect your Kubernetes clu
241
241
1. Based on your Kubernetes cluster deployment, set the following environment variable to provide a name to use for the Azure resource group that contains your Azure Arc-enabled cluster and resources:
|**GROUP_NAME**| Yes | <*Azure-Arc-cluster-resource-group-name*> | The name for the Azure resource group to use with your Azure Arc-enabled cluster and resources. This name must be unique across regions and can contain only letters, numbers, hyphens (**-**), underscores (**_**), parentheses (**()**), and periods (**.**). <br><br>This example uses **Hybrid-Arc-RG**. |
249
+
|**GROUP_NAME**| Yes | <*Azure-Arc-cluster-resource-group-name*> | The name for the Azure resource group to use with your Azure Arc-enabled cluster and other resources, such as your Azure Container Apps extension, custom location, and Azure Container Apps connected environment. This name must be unique across regions and can contain only letters, numbers, hyphens (**-**), underscores (**_**), parentheses (**()**), and periods (**.**). <br><br>This example uses **Hybrid-Arc-RG**. |
250
250
251
251
1. Create the Azure resource group for your Azure Arc-enabled cluster and resources:
252
252
@@ -264,7 +264,7 @@ To create your Azure Arc-enabled Kubernetes cluster, connect your Kubernetes clu
264
264
1. Set the following environment variable to provide a name for your Azure Arc-enabled Kubernetes cluster:
265
265
266
266
```azurecli
267
-
$CONNECTED_CLUSTER_NAME="$GROUP_NAME-cluster"
267
+
CONNECTED_CLUSTER_NAME="$GROUP_NAME-cluster"
268
268
```
269
269
270
270
| Parameter | Required | Value | Description |
@@ -306,7 +306,7 @@ You can create an optional, but recommended, Azure Log Analytics workspace, whic
306
306
1. Set the following environment variable to provide a name your Log Analytics workspace:
307
307
308
308
```azurecli
309
-
$WORKSPACE_NAME="$GROUP_NAME-workspace"
309
+
WORKSPACE_NAME="$GROUP_NAME-workspace"
310
310
```
311
311
312
312
| Parameter | Required | Value | Description |
@@ -329,21 +329,21 @@ You can create an optional, but recommended, Azure Log Analytics workspace, whic
329
329
1. Get the base64-encoded ID and shared key for your Log Analytics workspace. You need these values for a later step.
330
330
331
331
```azurecli
332
-
$LOG_ANALYTICS_WORKSPACE_ID=$(az monitor log-analytics workspace show \
332
+
LOG_ANALYTICS_WORKSPACE_ID=$(az monitor log-analytics workspace show \
0 commit comments