You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/includes/highest-security-level-guidance.md
+26-17Lines changed: 26 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,25 +3,34 @@ ms.service: azure-logic-apps
3
3
author: ecfan
4
4
ms.author: estfan
5
5
ms.topic: include
6
-
ms.date: 01/06/2025
6
+
ms.date: 04/01/2025
7
7
---
8
8
9
-
> [!IMPORTANT]
9
+
> [!WARNING]
10
10
>
11
-
> For optimal security, use [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
12
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication
13
-
> when possible. This method provides superior security without having to provide credentials. Azure manages
14
-
> this identity and helps keep authentication information secure so that you don't have to manage this sensitive
15
-
> information yourself. To set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/authenticate-with-managed-identity).
11
+
> Always secure and protect sensitive and personal data, such as credentials, secrets,
12
+
> access keys, connection strings, certificates, thumbprints, and similar information
13
+
> with the highest available or supported level of security.
16
14
>
17
-
> If you have to use a different authentication type, use the next highest level security option available.
18
-
> For example, suppose that you have to create a connection by using a connection string instead. A connection
19
-
> string includes the authorization information required for your app to access a specific resource, service,
20
-
> or system. The access key in the connection string is similar to a root password.
15
+
> For authentication and authorization, set up or use
16
+
> [Microsoft Entra ID](/entra/identity/authentication/overview-authentication) with a
> This solution provides optimal and superior security without you having to manually
19
+
> provide and manage credentials, secrets, access keys, and so on because Azure handles
20
+
> the managed identity for you. To set up a managed identity for Azure Logic Apps, see
21
+
> [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/authenticate-with-managed-identity).
21
22
>
22
-
> In production environments, always protect sensitive information and secrets, such as credentials, certificates,
23
-
> thumbprints, access keys, and connection strings. Make sure that you securely store such information by using
24
-
> Microsoft Entra ID and [Azure Key Vault](https://go.microsoft.com/fwlink/?linkid=2300117). Avoid hardcoding
25
-
> this information, sharing with other users, or saving in plain text anywhere that others can access. Rotate your
26
-
> secrets as soon as possible if you think this information might be compromised. For more information, see
0 commit comments