Skip to content

Commit 350c832

Browse files
committed
Clarity updates
1 parent a0389f2 commit 350c832

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

articles/logic-apps/logic-apps-azure-functions.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -243,12 +243,16 @@ To set up and use your logic app's managed identity to call your function, follo
243243

244244
1. Enable the managed identity on your logic app resource, and set up that identity's access to the target resource. For more information, review [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](create-managed-service-identity.md).
245245

246-
1. Enable authentication in your function and function app by following these steps:
246+
1. Enable authentication for your function app and function by following these steps:
247247

248248
1. [Set up anonymous authentication for your function](#set-authentication-function-app).
249249

250250
1. [Set up Azure AD authentication for your function app](#set-azure-ad-authentication).
251251

252+
1. [Create an app registration for your function app](#create-app-registration).
253+
254+
1. [Get the application ID (resource ID) from your app registration](#find-application-id) to later use in the **Audience** property in your workflow.
255+
252256
<a name="set-authentication-function-app"></a>
253257

254258
## Set up anonymous authentication for your function
@@ -287,13 +291,15 @@ To set up and use your logic app's managed identity to authenticate function cal
287291

288292
## Set up Azure AD authentication for your function app
289293

290-
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following sections show how to find these values.
294+
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following steps show how to find these values.
295+
296+
1. [Find the object (principal) ID for your logic app's managed identity](#find-object-id).
291297

292-
* The object (principal) ID for your logic app's managed identity
293-
* The tenant ID for your Azure Active Directory (Azure AD)
294-
* Client secret (optional)
298+
1. [Find the tenant ID for your Azure Active Directory (Azure AD)](#find-tenant-id).
295299

296-
### Find the object ID for your logic app's managed identity
300+
<a name="find-object-id"></a>
301+
302+
### Step 1 - Find the object ID for your logic app's managed identity
297303

298304
If your logic app doesn't have a managed identity set up yet, [enable the managed identity for your logic app](create-managed-service-identity.md). Based on the whether you have a Consumption or Standard logic app resource, follow the respective steps:
299305

@@ -339,7 +345,9 @@ If your logic app doesn't have a managed identity set up yet, [enable the manage
339345

340346
---
341347

342-
### Find the tenant ID for your Azure AD
348+
<a name="find-tenant-id"></a>
349+
350+
### Step 2 - Find the tenant ID for your Azure AD
343351

344352
For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
345353

@@ -351,7 +359,9 @@ For your Azure Active Directory (Azure AD), find the tenant ID. You can either r
351359

352360
![Screenshot showing your Azure AD "Properties" pane with tenant ID's copy button selected.](./media/logic-apps-azure-functions/azure-active-directory-tenant-id.png)
353361

354-
### Create an app registration for your function app
362+
<a name="create-app-registration"></a>
363+
364+
### Step 3 - Create an app registration for your function app
355365

356366
Now you're ready to set up Azure AD authentication for your function app by creating an app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
357367

@@ -372,7 +382,7 @@ Now you're ready to set up Azure AD authentication for your function app by crea
372382
| **Application (client) ID** | Yes | <*object-ID*> | The object ID for your logic app's managed identity. |
373383
| **Client secret** | <*client-secret*> | No, but recommended | The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
374384
| **Issuer URL** | No | `https://sts.windows.net/<Azure-AD-tenant-ID>` | The issuer URL appended with your Azure AD tenant ID |
375-
| **Allowed token audiences** | No | <*application-ID-URI*> | The application ID URI (resource ID) for the function app. Later, you use this same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>In this example, the value is **https://management.azure.com**. |
385+
| **Allowed token audiences** | No | <*application-ID-URI*> | The application ID URI (resource ID) for the function app. In this example, the value is **https://management.azure.com**. Later, you can use the same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>**Important**: The application ID URI (resource ID) must exactly match the value that Azure AD expects, including any required trailing slashes. |
376386
||||
377387

378388
At this point, your version looks similar to this example:
@@ -385,22 +395,12 @@ Now you're ready to set up Azure AD authentication for your function app by crea
385395

386396
1. To finish creating the app registration, select **Add**.
387397

388-
When you're done, the **Authentication** page now lists the identity provider. From here, you can edit or delete this provider configuration. You're now ready to use the Microsoft identity platform for authentication in your function app.
389-
390-
### Find the application ID URI (resource ID) for your function app
391-
392-
393-
* The application ID URI (resource ID) for your function app
394-
395-
For the function app that you want to access with the managed identity, get the application ID URI (resource ID). To find this application ID URI, review
398+
When you're done, the **Authentication** page now lists the identity provider and app ID (client ID) for the app registration. You're can now use this app registration for authentication in your function app.
396399

397-
> [!IMPORTANT]
398-
> This application ID URI (resource ID) must exactly match the value that Azure AD expects,
399-
> including any required trailing slashes. Later, you use this same URI in the **Audience**
400-
> property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity).
400+
1. Copy the app ID (client ID) for the app registration to later use in your workflow.
401401

402-
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity).
402+
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity) by using the built-in Azure Functions action.
403403

404404
## Next steps
405405

406-
* Learn about [connectors in Azure Logic Apps](../connectors/apis-list.md)
406+
* [Authentication access to Azure resources with managed identities in Azure Logic Apps](create-managed-service-identity.md#authentication-access-with-identity)

0 commit comments

Comments
 (0)