You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/create-managed-service-identity.md
+12-14Lines changed: 12 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,11 +58,14 @@ Unlike user-assigned identities, you don't have to manually create the system-as
58
58
59
59
1. In the [Azure portal](https://portal.azure.com), open your logic app in Logic App Designer.
60
60
61
-
1. On the logic app menu, under **Settings**, select **Identity**. Select **System assigned** > **On** > **Save**.
61
+
1. On the logic app menu, under **Settings**, select **Identity**. Select **System assigned** > **On** > **Save**. When Azure prompts you to confirm, select **Yes**.
62
62
63
63

64
64
65
-
1. When Azure prompts you to confirm, select **Yes**.
65
+
> [!NOTE]
66
+
> If you get an error that you can have only a single managed identity, your logic app is already
67
+
> associated with the user-assigned identity. Before you can add the system-assigned identity,
68
+
> you must first *remove* the user-assigned identity from your logic app.
66
69
67
70
Your logic app can now use the system-assigned identity, which is registered with Azure Active Directory and is represented by an object ID.
68
71
@@ -162,28 +165,23 @@ To set up a user-assigned managed identity for your logic app, you must first cr
162
165
| **Location** | Yes | <*Azure-region*> | The Azure region where to store information about your resource. This example uses "West US". |
163
166
|||||
164
167
165
-
Now you can add the user-assigned identity to your logic app.
166
-
167
-
> [!NOTE]
168
-
> You can add *only a single* user-assigned identity to your logic app.
168
+
Now you can add the user-assigned identity to your logic app. You can't add more than one user-assigned identity to your logic app.
169
169
170
170
1. In the Azure portal, find and open your logic app in Logic App Designer.
171
171
172
172
1. On the logic app menu, under **Settings**, select **Identity**, and then select **User assigned** > **Add**.
> If you can't select **Add**, your logic app is already associated with the system-assigned identity.
178
-
179
-
1. Under **Add user assigned managed identity**, in the **Subscription** list, if the Azure subscription that you want isn't selected, select that subscription. From the list that shows *all* the managed identities in that subscription, select the user-assigned identity that you want, and then select **Add**.
180
-
181
-
> [!TIP]
182
-
> In the **User assigned managed identities** search box, you can filter
183
-
> by the name for the identity or the resource group.
176
+
1. On the **Add user assigned managed identity** pane, from the **Subscription** list, select your Azure subscription if not already selected. From the list that shows *all* the managed identities in that subscription, find and select the user-assigned identity that you want. To filter the list, in the **User assigned managed identities** search box, enter the name for the identity or resource group. When you're done, select **Add**.
184
177
185
178

186
179
180
+
> [!NOTE]
181
+
> If you get an error that you can have only a single managed identity, your logic app is already
182
+
> associated with the system-assigned identity. Before you can add the user-assigned identity,
183
+
> you must first disable the system-assigned identity on your logic app.
184
+
187
185
Your logic app is now associated with the user-assigned managed identity.
188
186
189
187

Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: Secure access and data
3
-
description: Add security to protect inputs, outputs, request-based triggers, run history, management tasks, and access to other resources in Azure Logic Apps
3
+
description: Secure access to inputs, outputs, request-based triggers, run history, management tasks, and access to other resources in Azure Logic Apps
4
4
services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewer: klam, logicappspm
7
7
ms.topic: conceptual
8
-
ms.date: 01/10/2020
8
+
ms.date: 02/04/2020
9
9
---
10
10
11
11
# Secure access and data in Azure Logic Apps
@@ -605,6 +605,12 @@ Here are some ways that you can secure endpoints that receive calls or requests
605
605
606
606
HTTP and HTTPS endpoints support various kinds of authentication. Based on the trigger or action that you use to make outbound calls or requests that access these endpoints, you can select from varying ranges of authentication types. To make sure that you protect any sensitive information that your logic app handles, use secured parameters and encode data as necessary. For more information about using and securing parameters, see [Access to parameter inputs](#secure-action-parameters).
607
607
608
+
> [!NOTE]
609
+
> In the Logic App Designer, the **Authentication** property might be hidden on some triggers and actions
610
+
> where you can specify the authentication type. To make the property appear in these cases, on the trigger or action,
611
+
> open the **Add new parameter** list, and select **Authentication**. For more information, see
612
+
> [Authenticate access with managed identity](../logic-apps/create-managed-service-identity.md#authenticate-access-with-identity).
|**Authentication**|`type`| Yes |**Client Certificate** <br>or <br>`ClientCertificate`| The authentication type to use for Secure Sockets Layer (SSL) client certificates. While self-signed certificates are supported, self-signed certificates for SSL aren't supported. |
663
663
|**Pfx**|`pfx`| Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file <p><p>To convert the PFX file into base64-encoded format, you can use PowerShell by following these steps: <p>1. Save the certificate content into a variable: <p> `$pfx_cert = get-content 'c:\certificate.pfx' -Encoding Byte` <p>2. Convert the certificate content by using the `ToBase64String()` function and save that content to a text file: <p> `[System.Convert]::ToBase64String($pfx_cert) | Out-File 'pfx-encoded-bytes.txt'` |
664
-
|**Password**|`password`|See description | <*password-for-pfx-file*> | The password for accessing the PFX file. <p><p>**Note**: This property value is required when you work in the Logic App Designer and is *not* required when you work in code view.|
664
+
|**Password**|`password`|No | <*password-for-pfx-file*> | The password for accessing the PFX file |
665
665
|||||
666
666
667
667
When you use [secured parameters](#secure-action-parameters) to handle and protect sensitive information, for example, in an [Azure Resource Manager template for automating deployment](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can use expressions to access these parameter values at runtime. This example HTTP action definition specifies the authentication `type` as `ClientCertificate` and uses the [parameters() function](../logic-apps/workflow-definition-language-functions-reference.md#parameters) to get the parameter values:
@@ -699,14 +699,14 @@ If the [Active Directory OAuth](../active-directory/develop/about-microsoft-iden
|**Authentication**|`type`| Yes |**Active Directory OAuth** <br>or <br>`ActiveDirectoryOAuth`| The authentication type to use. Logic Apps currently follows the [OAuth 2.0 protocol](../active-directory/develop/v2-overview.md). |
702
+
|**Authority**|`authority`| No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the authentication token. By default, this value is `https://login.windows.net`. |
702
703
|**Tenant**|`tenant`| Yes | <*tenant-ID*> | The tenant ID for the Azure AD tenant |
703
704
|**Audience**|`audience`| Yes | <*resource-to-authorize*> | The resource that you want to use for authorization, for example, `https://management.core.windows.net/`|
704
705
|**Client ID**|`clientId`| Yes | <*client-ID*> | The client ID for the app requesting authorization |
705
706
|**Credential Type**|`credentialType`| Yes | Certificate <br>or <br>Secret | The credential type that the client uses for requesting authorization. This property and value don't appear in your logic app's underlying definition, but determines the properties that appear for the selected credential type. |
706
707
|**Secret**|`secret`| Yes, but only for the "Secret" credential type | <*client-secret*> | The client secret for requesting authorization |
707
708
|**Pfx**|`pfx`| Yes, but only for the "Certificate" credential type | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file |
708
709
|**Password**|`password`| Yes, but only for the "Certificate" credential type | <*password-for-pfx-file*> | The password for accessing the PFX file |
709
-
|**Authority**|`authority`| No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the authentication token. By default, this value is `https://login.windows.net`. <p>**Note**: To make this property visible in the designer, on the trigger or action, open the **Add new parameter** list, and select **Authority**. |
710
710
|||||
711
711
712
712
When you use [secured parameters](#secure-action-parameters) to handle and protect sensitive information, for example, in an [Azure Resource Manager template for automating deployment](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can use expressions to access these parameter values at runtime. This example HTTP action definition specifies the authentication `type` as `ActiveDirectoryOAuth`, the credential type as `Secret`, and uses the [parameters() function](../logic-apps/workflow-definition-language-functions-reference.md#parameters) to get the parameter values:
@@ -781,13 +781,13 @@ If the [Managed Identity](../active-directory/managed-identities-azure-resources
781
781
782
782
1. Before your logic app can use a managed identity, follow the steps in [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md). These steps enable the managed identity on your logic app and set up that identity's access to the target Azure resource.
783
783
784
-
2. Before an Azure function can use a managed identity, first [enable authentication for Azure functions](../logic-apps/logic-apps-azure-functions.md#enable-authentication-for-azure-functions).
784
+
1. Before an Azure function can use a managed identity, first [enable authentication for Azure functions](../logic-apps/logic-apps-azure-functions.md#enable-authentication-for-azure-functions).
785
785
786
-
3. In the trigger or action where you want to use the managed identity, specify these property values:
786
+
1. In the trigger or action where you want to use the managed identity, specify these property values:
|**Authentication**|`type`| Yes |**Managed Identity** <br>or <br>`ManagedServiceIdentity`| The authentication type to use <p>**Note**: The **Authentication** property might be hidden in some triggers or actions. To make this property visible, in the trigger or action, open the **Add new parameter** list, and select **Authentication**. |
790
+
|**Authentication**|`type`| Yes |**Managed Identity** <br>or <br>`ManagedServiceIdentity`| The authentication type to use |
791
791
|**Managed Identity**|`identity`| Yes | * **System Assigned Managed Identity** <br>or <br>`SystemAssigned` <p><p>* <*user-assigned-identity-name*> | The managed identity to use |
792
792
| **Audience** | `audience` | Yes | <*target-resource-ID*> | The resource ID for the target resource that you want to access. <p>For example, `https://storage.azure.com/` makes the access tokens for authentication valid for all storage accounts. However, you can also specify a root service URL, such as `https://fabrikamstorageaccount.blob.core.windows.net` for a specific storage account. <p>**Note**: The **Audience** property might be hidden in some triggers or actions. To make this property visible, in the trigger or action, open the **Add new parameter** list, and select **Audience**. <p><p>**Important**: Make sure that this target resource ID *exactly matches* the value that Azure AD expects, including any required trailing slashes. So, the `https://storage.azure.com/` resource ID for all Azure Blob Storage accounts requires a trailing slash. However, the resource ID for a specific storage account doesn't require a trailing slash. To find these resource IDs, see [Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication). |
0 commit comments