Skip to content

Commit 1e2cec5

Browse files
committed
Add partial updates for Request trigger OAuth
1 parent ca48a65 commit 1e2cec5

File tree

3 files changed

+14
-8
lines changed

3 files changed

+14
-8
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -734,37 +734,43 @@ When you use [secured parameters](#secure-action-parameters) to handle and prote
734734

735735
### Enable Azure AD OAuth authentication on Request triggers
736736

737-
To enable [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) authentication for incoming calls to Request triggers, follow these steps to set up an authorization policy. Here are some considerations for enabling this authentication support:
737+
If your logic app uses the Request trigger, you can use [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) authentication for authorizing inbound calls to your logic app. Before you enable this authentication, review these considerations:
738738

739739
* Your logic app can have up to five authorization policies. Each authorization policy can have up to 10 claims.
740740

741-
* An authorization policy must include the **Issuer** claim, which starts with the Azure Active Directory issuer ID, `https://sts.windows.net/`.
741+
* An authorization policy must include at least the **Issuer** [claim](../active-directory/develop/developer-glossary.md#claim) whose value starts with the Azure Active Directory issuer ID, `https://sts.windows.net/`.
742742

743-
* Your logic app can't use both [Shared Access Signatures (SAS)](#sas) and Azure AD OAuth.
743+
* Your logic app can't use both Azure AD OAuth [Shared Access Signatures (SAS)](#sas) for authorization.
744744

745745
* Currently, open authentication tokens are supported only for workflow trigger requests.
746746

747747
* Only Bearer-type authorization schemes are supported for OAuth tokens.
748748

749+
Now, to set up this authentication, follow these steps to add one or more authorization policies to your logic app.
750+
749751
1. In the [Azure portal](https://portal.microsoft.com), find and open your logic app in the Logic App Designer.
750752

751753
1. On the logic app menu, under **Settings**, select **Authorization**. After the Authorization pane opens, select **Add policy**.
752754

753755
![Select "Authorization" > "Add policy"](./media/logic-apps-securing-a-logic-app/add-azure-active-directory-authorization-policies.png)
754756

755-
1. Provide this information for the claims in your policy:
757+
1. Provide information about the authorization policy by specifying the claim types and values that your logic app requires from inbound requests:
756758

757-
![Provide information about the authorization policy](./media/logic-apps-securing-a-logic-app/set-up-authorization-policy.png)
759+
![Provide information for authorization policy](./media/logic-apps-securing-a-logic-app/set-up-authorization-policy.png)
758760

759761
| Property | Required | Description |
760762
|----------|----------|-------------|
761763
| **Policy name** | Yes | The name that you want to use for the authorization policy |
762-
| **Claims** | Yes | The list of claim types and values that incoming calls must use in the authentication tokens that they present to your logic app. The list requires at least the **Issuer** claim whose value must start with the Azure AD issuer ID, `https://sts.windows.net/`. <p><p>Standard claim types include **Issuer**, **Audience**, **Subject**, and the **JWT ID** type. You can also specify your own claim type and value. |
764+
| **Claims** | Yes | The list of [claim](../active-directory/develop/developer-glossary.md#claim) types and values that incoming calls must use in the authentication tokens that they present to your logic app. This list requires at least one **Issuer**-type claim, which has a value that starts with the Azure AD issuer ID, `https://sts.windows.net/`. <p><p>Standard claims have these types: <p><p>- **Issuer** <br>- **Audience** <br>- **Subject** <br>- **JWT ID** <p><p>For more information about these claim types, see [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value. |
763765
|||
764766

765-
1. To add another standard claim, select **Add standard claim**, select the claim type, and specify the corresponding value. To add your own claim, select **Add custom claim**, and specify the values for your custom claim.
767+
1. To add another claim, select from these options:
768+
769+
* To add another standard claim type, select the claim type, and specify the claim value.
770+
771+
* To add your own claim, select **Add custom claim**, and specify the custom claim value.
766772

767-
1. To add another authorization policy, select **Add policy**.
773+
1. To add another authorization policy, select **Add policy**. Repeat the previous steps to set up the policy.
768774

769775
1. When you're done, select **Save**.
770776

-5.38 KB
Loading
-6.74 KB
Loading

0 commit comments

Comments
 (0)