You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The complete URL looks like the following example:
916
916
@@ -924,31 +924,32 @@ The SAS in the URL has query parameters, which the following table describes:
924
924
|**`sv`**| Specifies the SAS version to use for generating the signature. |
925
925
|**`sig`**| Specifies the signature to use for authenticating access to the trigger. This signature is generated by using the SHA256 algorithm with a secret access key on all the URL paths and properties. This key is kept secret and encrypted, stored with the logic app, and is never exposed or published. Your logic app authorizes only those triggers that contain a valid signature created with the secret key. |
926
926
927
-
> [!CAUTION]
927
+
> [!IMPORTANT]
928
928
>
929
-
> Make sure to protect an SAS just as you would protect an account key from unauthorized use.
930
-
> Set up or have a plan in place for revoking a compromised SAS key. Employ discretion in
931
-
> distributing an SAS URI, and only distribute SAS URIs over a secure connection such as HTTPS.
932
-
> Make sure to only perform operations that use an SAS over an HTTPS connection.
929
+
> Make sure to protect your SAS key just as you protect an account key from unauthorized use. Set up or have a plan
930
+
> for revoking a compromised access key. Use discretion when you distribute URIs that use access keys, and only
931
+
> distribute such URIs over a secure connection such as HTTPS. Make sure to only perform operations that use an access
932
+
> key over an HTTPS connection. Anyone that has a URI with valid key can access the associated resource. To maintain
933
+
> security and protect access to your logic app workflow, [regenerate access keys](#regenerate-access-keys) on a regular
934
+
> schedule as they might need to comply with security policies or become compromised. This way, you can make sure that
935
+
> only authorized requests can trigger your workflow, which protects your data and processes from unauthorized access.
933
936
>
934
-
> If you use an SAS to access storage services, Microsoft recommends that you
937
+
> If you use an SAS key to access storage services, Microsoft recommends that you
935
938
> [create a user delegation SAS](/rest/api/storageservices/create-user-delegation-sas),
936
939
> which is secured with [Microsoft Entra ID](/entra/identity/authentication/overview-authentication),
937
940
> rather than an account key.
938
-
939
-
Inbound calls to the endpoint on a request-based trigger can use only one authorization scheme, either SAS or [OAuth 2.0 with Microsoft Entra ID](#enable-oauth). Although using one scheme doesn't disable the other, if you use both schemes at the same time, Azure Logic Apps generates an error because the service doesn't know which scheme to choose.
940
-
941
-
If your Consumption workflow starts with the **Request** trigger, you can [disable SAS authentication](#disable-sas). This option works even if you also [restrict authorization to use only OAuth 2.0 with Microsoft Entra ID](#enable-oauth-only-option). For Standard workflows, you can use other authentication types without disabling SAS.
942
-
943
-
> [!IMPORTANT]
944
941
>
945
942
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
946
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication when possible.
943
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
947
944
> This option provides superior security without having to provide credentials. Azure manages this identity and helps keep
948
945
> authentication information secure so that you don't have to manage this sensitive information. To set up a managed identity
949
946
> for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
950
947
951
-
For more information about using SAS, see the following sections in this guide:
948
+
Inbound calls to the endpoint on a request-based trigger can use only one authorization scheme, either SAS or [OAuth 2.0 with Microsoft Entra ID](#enable-oauth). Although using one scheme doesn't disable the other, if you use both schemes at the same time, Azure Logic Apps generates an error because the service doesn't know which scheme to choose.
949
+
950
+
If you have a Consumption workflow that starts with the **Request** trigger, you can [disable SAS authentication](#disable-sas). This option works even if you also [restrict authorization to use only OAuth 2.0 with Microsoft Entra ID](#enable-oauth-only-option). For Standard workflows, you can use other authentication types without disabling SAS.
951
+
952
+
For more information about security when you use an SAS key, see the following sections in this guide:
After you disable SAS authentication, the endpoint URL for the **Request** trigger no longer includes the SAS key, for example:
@@ -1051,14 +1052,34 @@ For Consumption workflows where you want to disable SAS authentication, follow t
1051
1052
1052
1053
### Regenerate access keys
1053
1054
1054
-
To generate a new security access key at any time, use the Azure REST API or Azure portal. All previously generated URLs that use the old key are invalidated and no longer have authorization to trigger the logic app. The URLs that you retrieve after regeneration are signed with the new access key.
1055
+
To maintain security and protect access to your logic app workflow, regenerate access keys on a regular schedule as they might need to comply with security policies or become compromised. This way, you can make sure that only authorized requests can trigger your workflow, which protects your data and processes from unauthorized access.
1056
+
1057
+
To generate a new access key at any time, use the Azure REST API or Azure portal. All previously generated URIs or URLs that use the old key are invalidated and no longer have authorization to trigger your logic app workflow. The URIs that you retrieve after regeneration are signed with the new access key.
1055
1058
1056
-
1. In the [Azure portal](https://portal.azure.com), open the logic app that has the key you want to regenerate.
1059
+
1. In the [Azure portal](https://portal.azure.com), open the logic app resource that uses the key you want to regenerate.
1057
1060
1058
1061
1. On the logic app resource menu, under **Settings**, select **Access Keys**.
1059
1062
1060
1063
1. Select the key that you want to regenerate and finish the process.
1061
1064
1065
+
> [!IMPORTANT]
1066
+
>
1067
+
> Make sure to protect your access key just as you protect an account key from unauthorized use. Set up or have a plan
1068
+
> for revoking a compromised access key. Use discretion when you distribute URIs that use access keys, and only
1069
+
> distribute such URIs over a secure connection such as HTTPS. Make sure to only perform operations that use an access
1070
+
> key over an HTTPS connection. Anyone that has a URI with valid key can access the associated resource.
1071
+
>
1072
+
> If you use an SAS key to access storage services, Microsoft recommends that you
1073
+
> [create a user delegation SAS](/rest/api/storageservices/create-user-delegation-sas),
1074
+
> which is secured with [Microsoft Entra ID](/entra/identity/authentication/overview-authentication),
1075
+
> rather than an account key.
1076
+
>
1077
+
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
1078
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication when possible.
1079
+
> This option provides superior security without having to provide credentials. Azure manages this identity and helps keep
1080
+
> authentication information secure so that you don't have to manage this sensitive information. To set up a managed identity
1081
+
> for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
1082
+
1062
1083
<aname="expiring-callback-urls"></a>
1063
1084
1064
1085
### Create expiring callback URLs
@@ -1593,7 +1614,7 @@ On all other triggers and actions that support the **Active Directory OAuth** (O
|**Authentication**|`type`| Yes |**Active Directory OAuth** (OAuth 2.0 with Microsoft Entra ID) <br>or <br>`ActiveDirectoryOAuth`| The authentication type to use. Azure Logic Apps currently follows the [OAuth 2.0 protocol](/entra/architecture/auth-oauth2). |
1596
-
|**Authority**|`authority`| No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the access token, such as `https://login.microsoftonline.com/` for Azure global service regions. For other national clouds, review [Microsoft Entra authentication endpoints - Choosing your identity authority](/entra/identity-platform/authentication-national-cloud#application-endpoints). |
1617
+
|**Authority**|`authority`| No | <*URL-for-authority-token-issuer*> | The URL for the authority that provides the access key, such as `https://login.microsoftonline.com/` for Azure global service regions. For other national clouds, review [Microsoft Entra authentication endpoints - Choosing your identity authority](/entra/identity-platform/authentication-national-cloud#application-endpoints). |
1597
1618
|**Tenant**|`tenant`| Yes | <*tenant-ID*> | The tenant ID for the Microsoft Entra tenant |
1598
1619
|**Audience**|`audience`| Yes | <*resource-to-authorize*> | The resource that you want to use for authorization, for example, `https://management.core.windows.net/`|
1599
1620
|**Client ID**|`clientId`| Yes | <*client-ID*> | The client ID for the app requesting authorization |
@@ -1765,7 +1786,7 @@ For more information about isolation, see the following documentation:
1765
1786
*[Isolation in the Azure Public Cloud](../security/fundamentals/isolation-choices.md)
1766
1787
*[Security for highly sensitive IaaS apps in Azure](/azure/architecture/reference-architectures/n-tier/high-security-iaas)
1767
1788
1768
-
## Related contet
1789
+
## Related content
1769
1790
1770
1791
*[Azure security baseline for Azure Logic Apps](security-baseline.md)
1771
1792
*[Automate deployment for Azure Logic Apps](logic-apps-azure-resource-manager-templates-overview.md)
0 commit comments