Skip to content

Commit 72ea819

Browse files
author
ecfan
committed
Fix Acrolinx issues
1 parent 9f07e47 commit 72ea819

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -398,7 +398,7 @@ To protect sensitive information in your logic app's workflow definition, use se
398398
> [!IMPORTANT]
399399
>
400400
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
401-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
401+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
402402
> Microsoft Entra ID and managed identities provides superior security and is easier to use than basic authentication. To learn
403403
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
404404
@@ -451,7 +451,7 @@ A [Resource Manager template](../logic-apps/logic-apps-azure-resource-manager-te
451451
> [!IMPORTANT]
452452
>
453453
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
454-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
454+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
455455
> Microsoft Entra ID and managed identities provides superior security and is easier to use than other authentication types. To learn
456456
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
457457
@@ -606,7 +606,7 @@ The following table identifies the authentication types that are available on th
606606
> [!IMPORTANT]
607607
>
608608
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
609-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication whenever possible.
609+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication whenever possible.
610610
> Microsoft Entra ID and managed identities provides superior security and is easier to use than other authentication types. To learn
611611
> how to set up a managed identity for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
612612
@@ -655,14 +655,15 @@ The following list includes more ways that you can limit access to triggers that
655655
* [Restrict inbound IP addresses](#restrict-inbound-ip-addresses)
656656

657657
<a name="sas"></a>
658+
<a name="generate-shared-access-signatures-sas"></a>
658659

659660
### Generate a shared access signature (SAS) key or token
660661

661662
A request-based trigger in a logic app workflow creates a callable endpoint to receive inbound requests that start the workflow. The URL for this endpoint includes a [Shared Access Signature (SAS)](/rest/api/storageservices/constructing-a-service-sas), which is a key or token that grants permissions, for example, to storage services. This URL uses the following format:
662663

663664
**`https://<request-endpoint-URI>sp=<permissions>sv=<SAS-version>sig=<signature>`**
664665

665-
Each endpoint URL includes query paramters, which the following table describes:
666+
Each endpoint URL includes query parameters, which the following table describes:
666667

667668
| Query parameter | Description |
668669
|-----------------|-------------|
@@ -687,13 +688,13 @@ In Consumption workflows, inbound calls to a request-based trigger endpoint can
687688
> [!IMPORTANT]
688689
>
689690
> For optimal security, Microsoft recommends using [Microsoft Entra ID](/entra/identity/authentication/overview-authentication)
690-
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview.md) for authentication when possible.
691+
> with [managed identities](/entra/identity/managed-identities-azure-resources/overview) for authentication when possible.
691692
> This authentication type provides superior security and is easier to use than other types. To set up a managed identity
692693
> for Azure Logic Apps, see [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](authenticate-with-managed-identity.md).
693694
694695
For more information about using SAS, see the following later sections in this guide:
695696

696-
* [Regenerate access keys](#access-keys)
697+
* [Regenerate access keys](#regenerate-access-keys)
697698
* [Create expiring callback URLs](#expiring-urls)
698699
* [Create URLs with primary or secondary key](#primary-secondary-key)
699700

@@ -703,7 +704,7 @@ For more information about using SAS, see the following later sections in this g
703704

704705
If your Consumption workflow starts with the **Request** trigger, and you want to use [OAuth with Microsoft Entra ID](#enable-oauth), you can disable SAS to avoid errors and problems running your workflow. You also add a security layer by removing the dependency on secrets, which reduces the risk in having secrets logged or leaked. For Standard workflows, you can use other authentication types without disabling SAS.
705706

706-
When you disable SAS authentication, the endpoint URL for your workflow's **Request** trigger no longer includes the SAS key, for example:
707+
After you disable SAS authentication, the endpoint URL for the **Request** trigger in your workflow no longer includes the SAS key, for example:
707708

708709
**Before**
709710

@@ -755,11 +756,11 @@ For this task, you'll need a tool to send REST API calls, for example:
755756

756757
1. In the [Azure portal](https://portal.azure.com), go to your Consumption workflow, and confirm that the endpoint URL for the **Request** trigger no longer includes the SAS.
757758

758-
1. At the Consumption logic app resource level, [add an authorization policy for OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
759+
1. At the logic app resource level, [add an authorization policy for OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
759760

760761
For more information, see [Enable Open Authorization with Microsoft Entra ID (Microsoft Entra ID OAuth)](#enable-oauth).
761762

762-
<a name="access-keys"></a>
763+
<a name="regenerate-access-keys"></a>
763764

764765
### Regenerate access keys
765766

@@ -810,13 +811,13 @@ In a Standard logic app workflow that starts with the **Request trigger** (but n
810811

811812
#### Considerations before you enable Microsoft Entra ID OAuth
812813

813-
* An inbound call to the request endpoint can use only one authorization scheme, either OAuth with Microsoft Entra ID or [Shared Access Signature (SAS)](#sas). Although using one scheme doesn't disable the other scheme, using both schemes at the same time causes an error because Azure Logic Apps doesn't know which scheme to choose.
814+
* In Consumption workflows, inbound calls to the endpoint URL for a request-based trigger can use only one authorization scheme, either OAuth with Microsoft Entra ID or [Shared Access Signature (SAS)](#sas). Although using one scheme doesn't disable the other scheme, if you use both schemes at the same time, Azure Logic Apps generates an error because the service doesn't know which scheme to choose. If your Consumption workflow starts with the **Request** trigger, you can [disable SAS authentication](#disable-sas). For Standard workflows, you can use other authentication types without disabling SAS.
814815

815816
* Azure Logic Apps supports either the [bearer type](../active-directory/develop/active-directory-v2-protocols.md#tokens) or [proof-of-possession type (Consumption logic app only)](/entra/msal/dotnet/advanced/proof-of-possession-tokens) authorization schemes for Microsoft Entra ID OAuth access tokens. However, the `Authorization` header for the access token must specify either the `Bearer` type or `PoP` type. For more information about how to get and use a PoP token, see [Get a Proof of Possession (PoP) token](#get-pop).
816817

817818
* Your logic app resource is limited to a maximum number of authorization policies. Each authorization policy also has a maximum number of [claims](../active-directory/develop/developer-glossary.md#claim). For more information, review [Limits and configuration for Azure Logic Apps](../logic-apps/logic-apps-limits-and-config.md#authentication-limits).
818819

819-
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with either `https://sts.windows.net/` or `https://login.microsoftonline.com/` (OAuth V2) as the Microsoft Entra issuer ID.
820+
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with either **`https://sts.windows.net/`** or **`https://login.microsoftonline.com/`** (OAuth V2) as the issuer for Microsoft Entra ID.
820821

821822
For example, suppose that your logic app resource has an authorization policy that requires two claim types, **Audience** and **Issuer**. This sample [payload section](../active-directory/develop/access-token-claims-reference.md#payload-claims) for a decoded access token includes both claim types where `aud` is the **Audience** value and `iss` is the **Issuer** value:
822823

@@ -1603,7 +1604,7 @@ When the [managed identity](../active-directory/managed-identities-azure-resourc
16031604
> By default, the system-assigned identity is already enabled to authenticate connections at run time.
16041605
> This identity differs from the authentication credentials or connection string that you use when you
16051606
> create a connection. If you disable this identity, connections won't work at run time. To view
1606-
> this setting, on your logic app's menu, under **Settings**, select **Identity**.
1607+
> this setting, on your logic app menu, under **Settings**, select **Identity**.
16071608
16081609
1. Before your logic app can use a managed identity, follow the steps in [Authenticate access to Azure resources by using managed identities in Azure Logic Apps](create-managed-service-identity.md). These steps enable the managed identity on your logic app and set up that identity's access to the target Azure resource.
16091610

0 commit comments

Comments
 (0)