You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-azure-functions.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -243,12 +243,16 @@ To set up and use your logic app's managed identity to call your function, follo
243
243
244
244
1. Enable the managed identity on your logic app resource, and set up that identity's access to the target resource. For more information, review [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](create-managed-service-identity.md).
245
245
246
-
1. Enable authentication in your function and function app by following these steps:
246
+
1. Enable authentication for your function app and function by following these steps:
247
247
248
248
1.[Set up anonymous authentication for your function](#set-authentication-function-app).
249
249
250
250
1.[Set up Azure AD authentication for your function app](#set-azure-ad-authentication).
251
251
252
+
1.[Create an app registration for your function app](#create-app-registration).
253
+
254
+
1.[Get the application ID (resource ID) from your app registration](#find-application-id) to later use in the **Audience** property in your workflow.
255
+
252
256
<aname="set-authentication-function-app"></a>
253
257
254
258
## Set up anonymous authentication for your function
@@ -287,13 +291,15 @@ To set up and use your logic app's managed identity to authenticate function cal
287
291
288
292
## Set up Azure AD authentication for your function app
289
293
290
-
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following sections show how to find these values.
294
+
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following steps show how to find these values.
295
+
296
+
1.[Find the object (principal) ID for your logic app's managed identity](#find-object-id).
291
297
292
-
* The object (principal) ID for your logic app's managed identity
293
-
* The tenant ID for your Azure Active Directory (Azure AD)
294
-
* Client secret (optional)
298
+
1.[Find the tenant ID for your Azure Active Directory (Azure AD)](#find-tenant-id).
295
299
296
-
### Find the object ID for your logic app's managed identity
300
+
<aname="find-object-id"></a>
301
+
302
+
### Step 1 - Find the object ID for your logic app's managed identity
297
303
298
304
If your logic app doesn't have a managed identity set up yet, [enable the managed identity for your logic app](create-managed-service-identity.md). Based on the whether you have a Consumption or Standard logic app resource, follow the respective steps:
299
305
@@ -339,7 +345,9 @@ If your logic app doesn't have a managed identity set up yet, [enable the manage
339
345
340
346
---
341
347
342
-
### Find the tenant ID for your Azure AD
348
+
<aname="find-tenant-id"></a>
349
+
350
+
### Step 2 - Find the tenant ID for your Azure AD
343
351
344
352
For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
345
353
@@ -351,7 +359,9 @@ For your Azure Active Directory (Azure AD), find the tenant ID. You can either r
351
359
352
360

353
361
354
-
### Create an app registration for your function app
362
+
<aname="create-app-registration"></a>
363
+
364
+
### Step 3 - Create an app registration for your function app
355
365
356
366
Now you're ready to set up Azure AD authentication for your function app by creating an app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
357
367
@@ -372,7 +382,7 @@ Now you're ready to set up Azure AD authentication for your function app by crea
372
382
|**Application (client) ID**| Yes | <*object-ID*> | The object ID for your logic app's managed identity. |
373
383
|**Client secret**| <*client-secret*> | No, but recommended | The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
374
384
|**Issuer URL**| No |`https://sts.windows.net/<Azure-AD-tenant-ID>`| The issuer URL appended with your Azure AD tenant ID |
375
-
|**Allowed token audiences**| No | <*application-ID-URI*> | The application ID URI (resource ID) for the function app. Later, you use this same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>In this example, the value is **https://management.azure.com**.|
385
+
|**Allowed token audiences**| No | <*application-ID-URI*> | The application ID URI (resource ID) for the function app. In this example, the value is **https://management.azure.com**. Later, you can use the same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>**Important**: The application ID URI (resource ID) must exactly match the value that Azure AD expects, including any required trailing slashes. |
376
386
||||
377
387
378
388
At this point, your version looks similar to this example:
@@ -385,22 +395,12 @@ Now you're ready to set up Azure AD authentication for your function app by crea
385
395
386
396
1. To finish creating the app registration, select **Add**.
387
397
388
-
When you're done, the **Authentication** page now lists the identity provider. From here, you can edit or delete this provider configuration. You're now ready to use the Microsoft identity platform for authentication in your function app.
389
-
390
-
### Find the application ID URI (resource ID) for your function app
391
-
392
-
393
-
* The application ID URI (resource ID) for your function app
394
-
395
-
For the function app that you want to access with the managed identity, get the application ID URI (resource ID). To find this application ID URI, review
398
+
When you're done, the **Authentication** page now lists the identity provider and app ID (client ID) for the app registration. You're can now use this app registration for authentication in your function app.
396
399
397
-
> [!IMPORTANT]
398
-
> This application ID URI (resource ID) must exactly match the value that Azure AD expects,
399
-
> including any required trailing slashes. Later, you use this same URI in the **Audience**
400
-
> property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity).
400
+
1. Copy the app ID (client ID) for the app registration to later use in your workflow.
401
401
402
-
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity).
402
+
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity) by using the built-in Azure Functions action.
403
403
404
404
## Next steps
405
405
406
-
*Learn about [connectors in Azure Logic Apps](../connectors/apis-list.md)
406
+
*[Authentication access to Azure resources with managed identities in Azure Logic Apps](create-managed-service-identity.md#authentication-access-with-identity)
0 commit comments