You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -398,7 +398,7 @@ To protect sensitive information in your logic app's workflow definition, use se
398
398
> [!IMPORTANT]
399
399
>
400
400
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
401
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
401
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
402
402
> Microsoft Entra ID and managed identities provides superior security and is easier to use than basic authentication. To learn
403
403
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
404
404
@@ -451,7 +451,7 @@ A [Resource Manager template](../logic-apps/logic-apps-azure-resource-manager-te
451
451
> [!IMPORTANT]
452
452
>
453
453
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
454
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
454
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
455
455
> Microsoft Entra ID and managed identities provides superior security and is easier to use than other authentication types. To learn
456
456
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
457
457
@@ -606,7 +606,7 @@ The following table identifies the authentication types that are available on th
606
606
> [!IMPORTANT]
607
607
>
608
608
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
609
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
609
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
610
610
> Microsoft Entra ID and managed identities provides superior security and is easier to use than other authentication types. To learn
611
611
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
612
612
@@ -655,14 +655,15 @@ The following list includes more ways that you can limit access to triggers that
655
655
*[Restrict inbound IP addresses](#restrict-inbound-ip-addresses)
### Generate a shared access signature (SAS) key or token
660
661
661
662
A request-based trigger in a logic app workflow creates a callable endpoint to receive inbound requests that start the workflow. The URL for this endpoint includes a [Shared Access Signature (SAS)](/rest/api/storageservices/constructing-a-service-sas), which is a key or token that grants permissions, for example, to storage services. This URL uses the following format:
Each endpoint URL includes query paramters, which the following table describes:
666
+
Each endpoint URL includes query parameters, which the following table describes:
666
667
667
668
| Query parameter | Description |
668
669
|-----------------|-------------|
@@ -687,13 +688,13 @@ In Consumption workflows, inbound calls to a request-based trigger endpoint can
687
688
> [!IMPORTANT]
688
689
>
689
690
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
690
-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication when possible.
691
+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication when possible.
691
692
> This authentication type provides superior security and is easier to use than other types. To set up a managed identity
692
693
> for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
693
694
694
695
For more information about using SAS, see the following later sections in this guide:
*[Create URLs with primary or secondary key](#primary-secondary-key)
699
700
@@ -703,7 +704,7 @@ For more information about using SAS, see the following later sections in this g
703
704
704
705
If your Consumption workflow starts with the **Request** trigger, and you want to use [OAuth with Microsoft Entra ID](#enable-oauth), you can disable SAS to avoid errors and problems running your workflow. You also add a security layer by removing the dependency on secrets, which reduces the risk in having secrets logged or leaked. For Standard workflows, you can use other authentication types without disabling SAS.
705
706
706
-
When you disable SAS authentication, the endpoint URL for your workflow's **Request** trigger no longer includes the SAS key, for example:
707
+
After you disable SAS authentication, the endpoint URL for the **Request** trigger in your workflow no longer includes the SAS key, for example:
707
708
708
709
**Before**
709
710
@@ -755,11 +756,11 @@ For this task, you'll need a tool to send REST API calls, for example:
755
756
756
757
1. In the [Azure portal](https://portal.azure.com), go to your Consumption workflow, and confirm that the endpoint URL for the **Request** trigger no longer includes the SAS.
757
758
758
-
1. At the Consumption logic app resource level, [add an authorization policy for OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
759
+
1. At the logic app resource level, [add an authorization policy for OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
759
760
760
761
For more information, see [Enable Open Authorization with Microsoft Entra ID (Microsoft Entra ID OAuth)](#enable-oauth).
761
762
762
-
<aname="access-keys"></a>
763
+
<aname="regenerate-access-keys"></a>
763
764
764
765
### Regenerate access keys
765
766
@@ -810,13 +811,13 @@ In a Standard logic app workflow that starts with the **Request trigger** (but n
810
811
811
812
#### Considerations before you enable Microsoft Entra ID OAuth
812
813
813
-
*An inbound call to the request endpoint can use only one authorization scheme, either OAuth with Microsoft Entra ID or [Shared Access Signature (SAS)](#sas). Although using one scheme doesn't disable the other scheme, using both schemes at the same time causes an error because Azure Logic Apps doesn't know which scheme to choose.
814
+
*In Consumption workflows, inbound calls to the endpoint URL for a request-based trigger can use only one authorization scheme, either OAuth with Microsoft Entra ID or [Shared Access Signature (SAS)](#sas). Although using one scheme doesn't disable the other scheme, if you use both schemes at the same time, Azure Logic Apps generates an error because the service doesn't know which scheme to choose. If your Consumption workflow starts with the **Request** trigger, you can [disable SAS authentication](#disable-sas). For Standard workflows, you can use other authentication types without disabling SAS.
814
815
815
816
* Azure Logic Apps supports either the [bearer type](../active-directory/develop/active-directory-v2-protocols.md#tokens) or [proof-of-possession type (Consumption logic app only)](/entra/msal/dotnet/advanced/proof-of-possession-tokens) authorization schemes for Microsoft Entra ID OAuth access tokens. However, the `Authorization` header for the access token must specify either the `Bearer` type or `PoP` type. For more information about how to get and use a PoP token, see [Get a Proof of Possession (PoP) token](#get-pop).
816
817
817
818
* Your logic app resource is limited to a maximum number of authorization policies. Each authorization policy also has a maximum number of [claims](../active-directory/develop/developer-glossary.md#claim). For more information, review [Limits and configuration for Azure Logic Apps](../logic-apps/logic-apps-limits-and-config.md#authentication-limits).
818
819
819
-
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with either `https://sts.windows.net/` or `https://login.microsoftonline.com/` (OAuth V2) as the Microsoft Entra issuer ID.
820
+
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with either **`https://sts.windows.net/`** or **`https://login.microsoftonline.com/`** (OAuth V2) as the issuer for Microsoft Entra ID.
820
821
821
822
For example, suppose that your logic app resource has an authorization policy that requires two claim types, **Audience** and **Issuer**. This sample [payload section](../active-directory/develop/access-token-claims-reference.md#payload-claims) for a decoded access token includes both claim types where `aud` is the **Audience** value and `iss` is the **Issuer** value:
822
823
@@ -1603,7 +1604,7 @@ When the [managed identity](../active-directory/managed-identities-azure-resourc
1603
1604
> By default, the system-assigned identity is already enabled to authenticate connections at run time.
1604
1605
> This identity differs from the authentication credentials or connection string that you use when you
1605
1606
> create a connection. If you disable this identity, connections won't work at run time. To view
1606
-
> this setting, on your logic app's menu, under **Settings**, select **Identity**.
1607
+
> this setting, on your logic app menu, under **Settings**, select **Identity**.
1607
1608
1608
1609
1. Before your logic app can use a managed identity, follow the steps in [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](create-managed-service-identity.md). These steps enable the managed identity on your logic app and set up that identity's access to the target Azure resource.
0 commit comments