Skip to content

Commit 6d2be8e

Browse files
authored
Merge pull request #297487 from ecfan/fresh2
[Update UX] Add authentication to custom API or web APIs
2 parents b35e19e + 1d4cd9e commit 6d2be8e

14 files changed

+132
-77
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
---
2+
ms.service: azure-logic-apps
3+
author: ecfan
4+
ms.author: estfan
5+
ms.topic: include
6+
ms.date: 04/01/2025
7+
---
8+
9+
> [!WARNING]
10+
>
11+
> Microsoft advises *against* using the following flows for authentication and authorization:
12+
>
13+
> - Resource Owner Password Credentials (ROPC) for OAuth 2.0
14+
>
15+
> This flow lets you sign in to an application with a password. The flow is incompatible with
16+
> multifactor authentication (MFA), requires a very high degree of trust in the application,
17+
> and carries risks that don't exist in other flows. Use this flow only if other more secure
18+
> flows aren't supported or available.
19+
>
20+
> For more information, see [Oauth 2.0 Resource Owner Password Credentials](/entra/identity-platform/v2-oauth-ropc).
21+
>
22+
> - Implicit grant flow for OAuth 2.0
23+
>
24+
> This token-based flow is intended for traditional web apps where the server has more secure
25+
> control over processing **`POST`** data and is often used with the [authorization code flow](/entra/identity-platform/v2-oauth2-auth-code-flow).
26+
> Due to how this flow handles and returns ID tokens or access tokens, the flow requires a very
27+
> high degree of trust in the application and carries risks that don't exist in other flows.
28+
> Use this flow only when other more secure flows aren't supported or available.
29+
>
30+
> For more information, see [OAuth 2.0 implicit grant flow](/entra/identity-platform/v2-oauth2-implicit-grant-flow).

articles/logic-apps/includes/highest-security-level-guidance.md

Lines changed: 26 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,34 @@ ms.service: azure-logic-apps
33
author: ecfan
44
ms.author: estfan
55
ms.topic: include
6-
ms.date: 01/06/2025
6+
ms.date: 04/01/2025
77
---
88

9-
> [!IMPORTANT]
9+
> [!WARNING]
1010
>
11-
> For optimal security, use [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
12-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication
13-
> when possible. This method provides superior security without having to provide credentials. Azure manages
14-
> this identity and helps keep authentication information secure so that you don't have to manage this sensitive
15-
> information yourself. To set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/authenticate-with-managed-identity).
11+
> Always secure and protect sensitive and personal data, such as credentials, secrets,
12+
> access keys, connection strings, certificates, thumbprints, and similar information
13+
> with the highest available or supported level of security.
1614
>
17-
> If you have to use a different authentication type, use the next highest level security option available.
18-
> For example, suppose that you have to create a connection by using a connection string instead. A connection
19-
> string includes the authorization information required for your app to access a specific resource, service,
20-
> or system. The access key in the connection string is similar to a root password.
15+
> For authentication and authorization, set up or use
16+
> [Microsoft Entra ID](/entra/identity/authentication/overview-authentication) with a
17+
> [managed identity](/entra/identity/managed-identities-azure-resources/overview).
18+
> This solution provides optimal and superior security without you having to manually
19+
> provide and manage credentials, secrets, access keys, and so on because Azure handles
20+
> the managed identity for you. To set up a managed identity for Azure Logic Apps, see
21+
> [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/authenticate-with-managed-identity).
2122
>
22-
> In production environments, always protect sensitive information and secrets, such as credentials, certificates,
23-
> thumbprints, access keys, and connection strings. Make sure that you securely store such information by using
24-
> Microsoft Entra ID and [Azure Key Vault](https://go.microsoft.com/fwlink/?linkid=2300117). Avoid hardcoding
25-
> this information, sharing with other users, or saving in plain text anywhere that others can access. Rotate your
26-
> secrets as soon as possible if you think this information might be compromised. For more information, see
27-
> [About Azure Key Vault](/azure/key-vault/general/overview).
23+
> If you can't use a managed identity, choose the next highest level security solution
24+
> available. For example, if you must use a connection string, which includes information
25+
> required to access a resource, service, or system, remember that this string includes
26+
> an access key that is similar to a root password.
27+
>
28+
> Make sure that you securely store such information by using Microsoft Entra ID and
29+
> [Azure Key Vault](/azure/key-vault/general/overview). Don't hardcode this information,
30+
> share with other users, or save in plain text anywhere that others can access. Set up
31+
> a plan to rotate or revoke secrets in the case they become compromised. For more
32+
> information, see the following resources:
33+
>
34+
> - [Automate secrets rotation in Azure Key Vault](/azure/key-vault/secrets/tutorial-rotation)
35+
> - [Best practices for protecting secrets](/azure/security/fundamentals/secrets-best-practices)
36+
> - [Secrets in Azure Key Vault](/azure/key-vault/secrets/)

articles/logic-apps/includes/secrets-guidance.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,16 @@ ms.date: 01/07/2025
88

99
> [!IMPORTANT]
1010
>
11-
> In production environments, always protect sensitive information and secrets, such as credentials, certificates,
12-
> thumbprints, access keys, and connection strings. Make sure that you securely store such information by using
13-
> Microsoft Entra ID and [Azure Key Vault](https://go.microsoft.com/fwlink/?linkid=2300117). Avoid hardcoding
14-
> this information, sharing with other users, or saving in plain text anywhere that others can access. Rotate your
15-
> secrets as soon as possible if you think this information might be compromised. For more information, see
16-
> [About Azure Key Vault](/azure/key-vault/general/overview).
11+
> Always secure and protect sensitive and personal data, such as credentials, secrets,
12+
> access keys, connection strings, certificates, thumbprints, and similar information
13+
> with the highest available or supported level of security.
14+
>
15+
> Make sure that you securely store such information by using Microsoft Entra ID and
16+
> [Azure Key Vault](/azure/key-vault/general/overview). Don't hardcode this information,
17+
> share with other users, or save in plain text anywhere that others can access. Set up
18+
> a plan to rotate or revoke secrets in the case they become compromised. For more
19+
> information, see the following resources:
20+
>
21+
> - [Automate secrets rotation in Azure Key Vault](/azure/key-vault/secrets/tutorial-rotation)
22+
> - [Best practices for protecting secrets](/azure/security/fundamentals/secrets-best-practices)
23+
> - [Secrets in Azure Key Vault](/azure/key-vault/secrets/)

0 commit comments

Comments
 (0)