You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-http.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,10 +45,13 @@ This built-in trigger makes an HTTP call to the specified URL for an endpoint an
45
45
46
46
1. Provide the values for the [HTTP trigger parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-trigger) that you want to include in the call to the target endpoint. Set up the recurrence for how often you want the trigger to check the target endpoint.
47
47
48
-
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
51
+
52
+
*[Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound)
53
+
*[Authenticate access to resources with managed identities](../logic-apps/create-managed-service-identity.md)
54
+
52
55
1. To add other available parameters, open the **Add new parameter** list, and select the parameters that you want.
53
56
54
57
1. Continue building your logic app's workflow with actions that run when the trigger fires.
@@ -75,10 +78,13 @@ This built-in action makes an HTTP call to the specified URL for an endpoint and
75
78
76
79
1. Provide the values for the [HTTP action parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-action) that you want to include in the call to the target endpoint.
77
80
78
-
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
If you select an authentication type other than **None**, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
84
+
85
+
*[Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound)
86
+
*[Authenticate access to resources with managed identities](../logic-apps/create-managed-service-identity.md)
87
+
82
88
1. To add other available parameters, open the **Add new parameter** list, and select the parameters that you want.
83
89
84
90
1. When you're done, remember to save your logic app. On the designer toolbar, select **Save**.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-azure-functions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -197,11 +197,11 @@ When you want to trigger a logic app from inside an Azure function, the logic ap
197
197
198
198
To authenticate access to resources in other Azure Active Directory (Azure AD) tenants without having to sign in and provide credentials or secrets, your logic app can use a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) (formerly known as Managed Service Identity or MSI). Azure manages this identity for you and helps secure your credentials because you don't have to provide or rotate secrets. Learn more about [Azure services that support managed identities for Azure AD authentication](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
199
199
200
-
If you set up your logic app to use the system-assigned managed identity, the Azure functions in your logic app can also use that same identity for authentication. For more information about authentication support for Azure functions in logic apps, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
200
+
If you set up your logic app to use the system-assigned identity or a manually-created user-assigned identity, the Azure functions in your logic app can also use that same identity for authentication. For more information about authentication support for Azure functions in logic apps, see [Add authentication to outbound calls](../logic-apps/logic-apps-securing-a-logic-app.md#add-authentication-outbound).
201
201
202
-
To set up and use the system-assigned identity with your function, follow these steps:
202
+
To set up and use the managed identity with your function, follow these steps:
203
203
204
-
1. Enable the system-assigned identity on your logic app, and set up that identity's access to the target resource. See [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md).
204
+
1. Enable the managed identity on your logic app, and set up that identity's access to the target resource. See [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](../logic-apps/create-managed-service-identity.md).
205
205
206
206
1. Enable authentication in your Azure function and function app by following these steps:
207
207
@@ -212,7 +212,7 @@ To set up and use the system-assigned identity with your function, follow these
212
212
213
213
### Set up anonymous authentication in your function
214
214
215
-
To use your logic app's system-assigned identity in your Azure function, you have set your function's authentication level to anonymous. Otherwise, your logic app throws a "BadRequest" error.
215
+
To use your logic app's managed identity in your Azure function, you have set your function's authentication level to anonymous. Otherwise, your logic app throws a "BadRequest" error.
216
216
217
217
1. In the [Azure portal](https://portal.azure.com), find and select your function app. These steps use "FabrikamFunctionApp" as the example function app.
0 commit comments