Skip to content

Commit 1fd8a0b

Browse files
authored
Merge pull request #88394 from ecfan/user-assigned-identity
Updates for user-assigned identity - 02/10/2020
2 parents 8f3b6b0 + 179db40 commit 1fd8a0b

37 files changed

+329
-81
lines changed

articles/connectors/connectors-native-http.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -45,10 +45,13 @@ This built-in trigger makes an HTTP call to the specified URL for an endpoint an
4545

4646
1. Provide the values for the [HTTP trigger parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-trigger) that you want to include in the call to the target endpoint. Set up the recurrence for how often you want the trigger to check the target endpoint.
4747

48-
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
49-
5048
![Enter HTTP trigger parameters](./media/connectors-native-http/http-trigger-parameters.png)
5149

50+
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
51+
52+
* [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound)
53+
* [Authenticate access to resources with managed identities](../logic-apps/create-managed-service-identity.md)
54+
5255
1. To add other available parameters, open the **Add new parameter** list, and select the parameters that you want.
5356

5457
1. Continue building your logic app's workflow with actions that run when the trigger fires.
@@ -75,10 +78,13 @@ This built-in action makes an HTTP call to the specified URL for an endpoint and
7578

7679
1. Provide the values for the [HTTP action parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-action) that you want to include in the call to the target endpoint.
7780

78-
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
79-
8081
![Enter HTTP action parameters](./media/connectors-native-http/http-action-parameters.png)
8182

83+
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
84+
85+
* [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound)
86+
* [Authenticate access to resources with managed identities](../logic-apps/create-managed-service-identity.md)
87+
8288
1. To add other available parameters, open the **Add new parameter** list, and select the parameters that you want.
8389

8490
1. When you're done, remember to save your logic app. On the designer toolbar, select **Save**.
-89 Bytes
Loading
5.26 KB
Loading
6.56 KB
Loading

articles/logic-apps/create-managed-service-identity.md

Lines changed: 293 additions & 54 deletions
Large diffs are not rendered by default.

articles/logic-apps/logic-apps-azure-functions.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -197,11 +197,11 @@ When you want to trigger a logic app from inside an Azure function, the logic ap
197197

198198
To authenticate access to resources in other Azure Active Directory (Azure AD) tenants without having to sign in and provide credentials or secrets, your logic app can use a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) (formerly known as Managed Service Identity or MSI). Azure manages this identity for you and helps secure your credentials because you don't have to provide or rotate secrets. Learn more about [Azure services that support managed identities for Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
199199

200-
If you set up your logic app to use the system-assigned managed identity, the Azure functions in your logic app can also use that same identity for authentication. For more information about authentication support for Azure functions in logic apps, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
200+
If you set up your logic app to use the system-assigned identity or a manually-created user-assigned identity, the Azure functions in your logic app can also use that same identity for authentication. For more information about authentication support for Azure functions in logic apps, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
201201

202-
To set up and use the system-assigned identity with your function, follow these steps:
202+
To set up and use the managed identity with your function, follow these steps:
203203

204-
1. Enable the system-assigned identity on your logic app, and set up that identity's access to the target resource. See [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md).
204+
1. Enable the managed identity on your logic app, and set up that identity's access to the target resource. See [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md).
205205

206206
1. Enable authentication in your Azure function and function app by following these steps:
207207

@@ -212,7 +212,7 @@ To set up and use the system-assigned identity with your function, follow these
212212

213213
### Set up anonymous authentication in your function
214214

215-
To use your logic app's system-assigned identity in your Azure function, you have set your function's authentication level to anonymous. Otherwise, your logic app throws a "BadRequest" error.
215+
To use your logic app's managed identity in your Azure function, you have set your function's authentication level to anonymous. Otherwise, your logic app throws a "BadRequest" error.
216216

217217
1. In the [Azure portal](https://portal.azure.com), find and select your function app. These steps use "FabrikamFunctionApp" as the example function app.
218218

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: klam, logicappspm
77
ms.topic: article
8-
ms.date: 01/18/2020
8+
ms.date: 02/10/2020
99
---
1010

1111
# Limits and configuration information for Azure Logic Apps
@@ -187,8 +187,9 @@ Here are the limits for custom connectors that you can create from web APIs.
187187
## Managed identities
188188

189189
| Name | Limit |
190-
| ---- | ----- |
191-
| Number of logic apps that have the system-assigned identity in an Azure subscription per region | 100 |
190+
|------|-------|
191+
| Managed identities per logic app | Either the system-assigned identity or 1 user-assigned identity |
192+
| Number of logic apps that have a managed identity in an Azure subscription per region | 100 |
192193
|||
193194

194195
<a name="integration-account-limits"></a>

0 commit comments

Comments
 (0)