You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/create-single-tenant-workflows-azure-portal.md
+21-6Lines changed: 21 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -393,19 +393,34 @@ For an existing stateful workflow run, you can rerun the entire workflow with th
393
393
394
394
By default, your Standard logic app authenticates access to your Azure Storage account by using a connection string. However, you can set up a user-assigned managed identity to authenticate access instead.
395
395
396
-
1.From your storage account, get the URIs for the Blob, Queue, and Table services by following these steps:
396
+
1.In the [Azure portal](https://portal.azure.com), [follow these steps to create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
397
397
398
-
1. In the Azure portal, go to your storage account. On the storage account menu, under **Settings**, select **Endpoints**.
398
+
1. From your user-assigned identity, get the resource ID:
399
+
400
+
1. On the user-assigned managed identity menu, under **Settings**, select **Properties**.
401
+
402
+
1. From the **Id** property, copy and save the resource ID.
403
+
404
+
1. From your storage account, get the URIs for the Blob, Queue, and Table services:
405
+
406
+
1. On the storage account menu, under **Settings**, select **Endpoints**.
399
407
400
408
1. Copy and save the URIs for **Blob service**, **Queue service**, and **Table service**.
401
409
402
-
1.If you haven't already, [follow these steps to create a user-assigned managed identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
410
+
1.On your storage account, add the necessary [role assignments](../role-based-access-control/role-assignments.md) to your user-assignedidentity:
403
411
404
-
1. From your user-assigned identity, get the resource ID by following these steps:
412
+
1. On the storage account menu, select **Access control (IAM)**.
405
413
406
-
1. On the user-assigned managed identity menu, under **Settings**, select **Properties**.
414
+
1. On the **Access control (IAM)** page toolbar, from the **Add** menu, select **Add role assignment**.
407
415
408
-
1. From the **Id** property, copy and save the resource ID.
416
+
1. On the **Job function roles** tab, add each of the following roles to the user-assigned identity:
417
+
418
+
- Storage Account Contribtor
419
+
- Storage Blob Data Owner
420
+
- Storage Queue Data Contributor
421
+
- Storage Data Data Contributor
422
+
423
+
For more information, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
409
424
410
425
1. Go to your Standard logic app. On the logic app menu, select **Overview**.
0 commit comments