Skip to content

Commit 07b6f95

Browse files
committed
Clarify that only only system-assigned managed identity will work
1 parent 5778e47 commit 07b6f95

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

articles/connectors/connectors-create-api-azureblobstorage.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
8-
ms.date: 05/28/2022
8+
ms.date: 07/30/2022
99
tags: connectors
1010
---
1111

@@ -293,7 +293,7 @@ You can add network security to an Azure storage account by [restricting access
293293

294294
- To access storage accounts behind firewalls using the Azure Blob Storage managed connector in Consumption, Standard, and ISE-based logic apps, review the following documentation:
295295

296-
- [Access storage accounts in same region with managed identities](#access-blob-storage-in-same-region-with-managed-identities)
296+
- [Access storage accounts in same region with system managed identities](#access-blob-storage-in-same-region-with-system-managed-identities)
297297

298298
- [Access storage accounts in other regions](#access-storage-accounts-in-other-regions)
299299

@@ -345,7 +345,7 @@ To add your outbound IP addresses to the storage account firewall, follow these
345345

346346
You don't have to create a private endpoint. You can just permit traffic through the ISE outbound IPs on the storage account.
347347

348-
### Access Blob Storage in same region with managed identities
348+
### Access Blob Storage in same region with system managed identities
349349

350350
To connect to Azure Blob Storage in any region, you can use [managed identities for authentication](../active-directory/managed-identities-azure-resources/overview.md). You can create an exception that gives Microsoft trusted services, such as a managed identity, access to your storage account through a firewall.
351351

@@ -360,10 +360,9 @@ To use managed identities in your logic app to access Blob Storage, follow these
360360
> [!NOTE]
361361
> Limitations for this solution:
362362
>
363-
> - You must set up a managed identity to authenticate your storage account connection.
363+
> - You must set up a system-assigned managed identity to authenticate your storage account connection. User-assigned managed
364+
> identity will not work.
364365
>
365-
> - For Standard logic apps in the single-tenant Azure Logic Apps environment, only the system-assigned
366-
> managed identity is available and supported, not the user-assigned managed identity.
367366
368367
#### Configure storage account access
369368

0 commit comments

Comments
 (0)