Skip to content

Commit 71a3204

Browse files
author
ecfan
committed
Add steps to assign necessary roles
1 parent 8417780 commit 71a3204

File tree

1 file changed

+21
-6
lines changed

1 file changed

+21
-6
lines changed

articles/logic-apps/create-single-tenant-workflows-azure-portal.md

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -393,19 +393,34 @@ For an existing stateful workflow run, you can rerun the entire workflow with th
393393

394394
By default, your Standard logic app authenticates access to your Azure Storage account by using a connection string. However, you can set up a user-assigned managed identity to authenticate access instead.
395395

396-
1. From your storage account, get the URIs for the Blob, Queue, and Table services by following these steps:
396+
1. In the [Azure portal](https://portal.azure.com), [follow these steps to create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
397397

398-
1. In the Azure portal, go to your storage account. On the storage account menu, under **Settings**, select **Endpoints**.
398+
1. From your user-assigned identity, get the resource ID:
399+
400+
1. On the user-assigned managed identity menu, under **Settings**, select **Properties**.
401+
402+
1. From the **Id** property, copy and save the resource ID.
403+
404+
1. From your storage account, get the URIs for the Blob, Queue, and Table services:
405+
406+
1. On the storage account menu, under **Settings**, select **Endpoints**.
399407

400408
1. Copy and save the URIs for **Blob service**, **Queue service**, and **Table service**.
401409

402-
1. If you haven't already, [follow these steps to create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
410+
1. On your storage account, add the necessary [role assignments](../role-based-access-control/role-assignments.md) to your user-assigned identity:
403411

404-
1. From your user-assigned identity, get the resource ID by following these steps:
412+
1. On the storage account menu, select **Access control (IAM)**.
405413

406-
1. On the user-assigned managed identity menu, under **Settings**, select **Properties**.
414+
1. On the **Access control (IAM)** page toolbar, from the **Add** menu, select **Add role assignment**.
407415

408-
1. From the **Id** property, copy and save the resource ID.
416+
1. On the **Job function roles** tab, add each of the following roles to the user-assigned identity:
417+
418+
- Storage Account Contribtor
419+
- Storage Blob Data Owner
420+
- Storage Queue Data Contributor
421+
- Storage Data Data Contributor
422+
423+
For more information, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
409424

410425
1. Go to your Standard logic app. On the logic app menu, select **Overview**.
411426

0 commit comments

Comments
 (0)