Skip to content

Commit 179db40

Browse files
committed
Updates per feedback
1 parent 9a6c488 commit 179db40

File tree

2 files changed

+25
-27
lines changed

2 files changed

+25
-27
lines changed

articles/logic-apps/create-managed-service-identity.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,14 @@ Unlike user-assigned identities, you don't have to manually create the system-as
5858

5959
1. In the [Azure portal](https://portal.azure.com), open your logic app in Logic App Designer.
6060

61-
1. On the logic app menu, under **Settings**, select **Identity**. Select **System assigned** > **On** > **Save**.
61+
1. On the logic app menu, under **Settings**, select **Identity**. Select **System assigned** > **On** > **Save**. When Azure prompts you to confirm, select **Yes**.
6262

6363
![Enable the system-assigned identity](./media/create-managed-service-identity/enable-system-assigned-identity.png)
6464

65-
1. When Azure prompts you to confirm, select **Yes**.
65+
> [!NOTE]
66+
> If you get an error that you can have only a single managed identity, your logic app is already
67+
> associated with the user-assigned identity. Before you can add the system-assigned identity,
68+
> you must first *remove* the user-assigned identity from your logic app.
6669
6770
Your logic app can now use the system-assigned identity, which is registered with Azure Active Directory and is represented by an object ID.
6871

@@ -162,28 +165,23 @@ To set up a user-assigned managed identity for your logic app, you must first cr
162165
| **Location** | Yes | <*Azure-region*> | The Azure region where to store information about your resource. This example uses "West US". |
163166
|||||
164167

165-
Now you can add the user-assigned identity to your logic app.
166-
167-
> [!NOTE]
168-
> You can add *only a single* user-assigned identity to your logic app.
168+
Now you can add the user-assigned identity to your logic app. You can't add more than one user-assigned identity to your logic app.
169169

170170
1. In the Azure portal, find and open your logic app in Logic App Designer.
171171

172172
1. On the logic app menu, under **Settings**, select **Identity**, and then select **User assigned** > **Add**.
173173

174174
![Add user-assigned managed identity](./media/create-managed-service-identity/add-user-assigned-identity-logic-app.png)
175175

176-
> [!NOTE]
177-
> If you can't select **Add**, your logic app is already associated with the system-assigned identity.
178-
179-
1. Under **Add user assigned managed identity**, in the **Subscription** list, if the Azure subscription that you want isn't selected, select that subscription. From the list that shows *all* the managed identities in that subscription, select the user-assigned identity that you want, and then select **Add**.
180-
181-
> [!TIP]
182-
> In the **User assigned managed identities** search box, you can filter
183-
> by the name for the identity or the resource group.
176+
1. On the **Add user assigned managed identity** pane, from the **Subscription** list, select your Azure subscription if not already selected. From the list that shows *all* the managed identities in that subscription, find and select the user-assigned identity that you want. To filter the list, in the **User assigned managed identities** search box, enter the name for the identity or resource group. When you're done, select **Add**.
184177

185178
![Select the user-assigned identity to use](./media/create-managed-service-identity/select-user-assigned-identity.png)
186179

180+
> [!NOTE]
181+
> If you get an error that you can have only a single managed identity, your logic app is already
182+
> associated with the system-assigned identity. Before you can add the user-assigned identity,
183+
> you must first disable the system-assigned identity on your logic app.
184+
187185
Your logic app is now associated with the user-assigned managed identity.
188186

189187
![Association with user-assigned identity](./media/create-managed-service-identity/added-user-assigned-identity.png)

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Secure access and data
3-
description: Add security to protect inputs, outputs, request-based triggers, run history, management tasks, and access to other resources in Azure Logic Apps
3+
description: Secure access to inputs, outputs, request-based triggers, run history, management tasks, and access to other resources in Azure Logic Apps
44
services: logic-apps
55
ms.suite: integration
66
ms.reviewer: klam, logicappspm
77
ms.topic: conceptual
8-
ms.date: 01/10/2020
8+
ms.date: 02/04/2020
99
---
1010

1111
# Secure access and data in Azure Logic Apps
@@ -605,6 +605,12 @@ Here are some ways that you can secure endpoints that receive calls or requests
605605

606606
HTTP and HTTPS endpoints support various kinds of authentication. Based on the trigger or action that you use to make outbound calls or requests that access these endpoints, you can select from varying ranges of authentication types. To make sure that you protect any sensitive information that your logic app handles, use secured parameters and encode data as necessary. For more information about using and securing parameters, see [Access to parameter inputs](#secure-action-parameters).
607607

608+
> [!NOTE]
609+
> In the Logic App Designer, the **Authentication** property might be hidden on some triggers and actions
610+
> where you can specify the authentication type. To make the property appear in these cases, on the trigger or action,
611+
> open the **Add new parameter** list, and select **Authentication**. For more information, see
612+
> [Authenticate access with managed identity](../logic-apps/create-managed-service-identity.md#authenticate-access-with-identity).
613+
608614
| Authentication type | Supported by |
609615
|---------------------|--------------|
610616
| [Basic](#basic-authentication) | Azure API Management, Azure App Services, HTTP, HTTP + Swagger, HTTP Webhook |
@@ -614,12 +620,6 @@ HTTP and HTTPS endpoints support various kinds of authentication. Based on the t
614620
| [Managed identity](#managed-identity-authentication) | Azure API Management, Azure App Services, Azure Functions, HTTP, HTTP + Swagger, HTTP Webhook |
615621
|||
616622

617-
> [!NOTE]
618-
> In the Logic App Designer, the **Authentication** property might be hidden on some triggers and actions
619-
> where you can specify the authentication type. To make the property appear in these cases, on the trigger or action,
620-
> open the **Add new parameter** list, and select **Authentication**. For more information, see
621-
> [Authenticate access with managed identity](../logic-apps/create-managed-service-identity.md#authenticate-access-with-identity).
622-
623623
<a name="basic-authentication"></a>
624624

625625
### Basic authentication
@@ -661,7 +661,7 @@ If the [Client Certificate](../active-directory/authentication/active-directory-
661661
|---------------------|-----------------|----------|-------|-------------|
662662
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for Secure Sockets Layer (SSL) client certificates. While self-signed certificates are supported, self-signed certificates for SSL aren't supported. |
663663
| **Pfx** | `pfx` | Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file <p><p>To convert the PFX file into base64-encoded format, you can use PowerShell by following these steps: <p>1. Save the certificate content into a variable: <p> `$pfx_cert = get-content 'c:\certificate.pfx' -Encoding Byte` <p>2. Convert the certificate content by using the `ToBase64String()` function and save that content to a text file: <p> `[System.Convert]::ToBase64String($pfx_cert) | Out-File 'pfx-encoded-bytes.txt'` |
664-
| **Password** | `password`| See description | <*password-for-pfx-file*> | The password for accessing the PFX file. <p><p>**Note**: This property value is required when you work in the Logic App Designer and is *not* required when you work in code view. |
664+
| **Password** | `password`| No | <*password-for-pfx-file*> | The password for accessing the PFX file |
665665
|||||
666666

667667
When you use [secured parameters](#secure-action-parameters) to handle and protect sensitive information, for example, in an [Azure Resource Manager template for automating deployment](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can use expressions to access these parameter values at runtime. This example HTTP action definition specifies the authentication `type` as `ClientCertificate` and uses the [parameters() function](../logic-apps/workflow-definition-language-functions-reference.md#parameters) to get the parameter values:
@@ -699,14 +699,14 @@ If the [Active Directory OAuth](../active-directory/develop/about-microsoft-iden
699699
| Property (designer) | Property (JSON) | Required | Value | Description |
700700
|---------------------|-----------------|----------|-------|-------------|
701701
| **Authentication** | `type` | Yes | **Active Directory OAuth** <br>or <br>`ActiveDirectoryOAuth` | The authentication type to use. Logic Apps currently follows the [OAuth 2.0 protocol](../active-directory/develop/v2-overview.md). |
702+
| **Authority** | `authority` | No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the authentication token. By default, this value is `https://login.windows.net`. |
702703
| **Tenant** | `tenant` | Yes | <*tenant-ID*> | The tenant ID for the Azure AD tenant |
703704
| **Audience** | `audience` | Yes | <*resource-to-authorize*> | The resource that you want to use for authorization, for example, `https://management.core.windows.net/` |
704705
| **Client ID** | `clientId` | Yes | <*client-ID*> | The client ID for the app requesting authorization |
705706
| **Credential Type** | `credentialType` | Yes | Certificate <br>or <br>Secret | The credential type that the client uses for requesting authorization. This property and value don't appear in your logic app's underlying definition, but determines the properties that appear for the selected credential type. |
706707
| **Secret** | `secret` | Yes, but only for the "Secret" credential type | <*client-secret*> | The client secret for requesting authorization |
707708
| **Pfx** | `pfx` | Yes, but only for the "Certificate" credential type | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file |
708709
| **Password** | `password` | Yes, but only for the "Certificate" credential type | <*password-for-pfx-file*> | The password for accessing the PFX file |
709-
| **Authority** | `authority` | No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the authentication token. By default, this value is `https://login.windows.net`. <p>**Note**: To make this property visible in the designer, on the trigger or action, open the **Add new parameter** list, and select **Authority**. |
710710
|||||
711711

712712
When you use [secured parameters](#secure-action-parameters) to handle and protect sensitive information, for example, in an [Azure Resource Manager template for automating deployment](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can use expressions to access these parameter values at runtime. This example HTTP action definition specifies the authentication `type` as `ActiveDirectoryOAuth`, the credential type as `Secret`, and uses the [parameters() function](../logic-apps/workflow-definition-language-functions-reference.md#parameters) to get the parameter values:
@@ -781,13 +781,13 @@ If the [Managed Identity](../active-directory/managed-identities-azure-resources
781781

782782
1. Before your logic app can use a managed identity, follow the steps in [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md). These steps enable the managed identity on your logic app and set up that identity's access to the target Azure resource.
783783

784-
2. Before an Azure function can use a managed identity, first [enable authentication for Azure functions](../logic-apps/logic-apps-azure-functions.md#enable-authentication-for-azure-functions).
784+
1. Before an Azure function can use a managed identity, first [enable authentication for Azure functions](../logic-apps/logic-apps-azure-functions.md#enable-authentication-for-azure-functions).
785785

786-
3. In the trigger or action where you want to use the managed identity, specify these property values:
786+
1. In the trigger or action where you want to use the managed identity, specify these property values:
787787

788788
| Property (designer) | Property (JSON) | Required | Value | Description |
789789
|---------------------|-----------------|----------|-------|-------------|
790-
| **Authentication** | `type` | Yes | **Managed Identity** <br>or <br>`ManagedServiceIdentity` | The authentication type to use <p>**Note**: The **Authentication** property might be hidden in some triggers or actions. To make this property visible, in the trigger or action, open the **Add new parameter** list, and select **Authentication**. |
790+
| **Authentication** | `type` | Yes | **Managed Identity** <br>or <br>`ManagedServiceIdentity` | The authentication type to use |
791791
| **Managed Identity** | `identity` | Yes | * **System Assigned Managed Identity** <br>or <br>`SystemAssigned` <p><p>* <*user-assigned-identity-name*> | The managed identity to use |
792792
| **Audience** | `audience` | Yes | <*target-resource-ID*> | The resource ID for the target resource that you want to access. <p>For example, `https://storage.azure.com/` makes the access tokens for authentication valid for all storage accounts. However, you can also specify a root service URL, such as `https://fabrikamstorageaccount.blob.core.windows.net` for a specific storage account. <p>**Note**: The **Audience** property might be hidden in some triggers or actions. To make this property visible, in the trigger or action, open the **Add new parameter** list, and select **Audience**. <p><p>**Important**: Make sure that this target resource ID *exactly matches* the value that Azure AD expects, including any required trailing slashes. So, the `https://storage.azure.com/` resource ID for all Azure Blob Storage accounts requires a trailing slash. However, the resource ID for a specific storage account doesn't require a trailing slash. To find these resource IDs, see [Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication). |
793793
|||||

0 commit comments

Comments
 (0)