Skip to content

Commit 78767b9

Browse files
committed
updates
1 parent eacad83 commit 78767b9

File tree

1 file changed

+13
-12
lines changed

1 file changed

+13
-12
lines changed

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -215,24 +215,26 @@ To configure those you follow these steps:
215215
216216
1. Select Save.
217217
218-
219-
## Configure authorization policy for custom task extension with normal security token type
220-
221-
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
218+
## Configure authorization policy for custom task extension with POP security token type
219+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
222220
223221
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
224222
225223
1. Go back to the logic app you created, and select **Authorization**.
226224
227225
1. Create two authorization policies based on these tables:
228226
229-
Policy name: AzureADLifecycleWorkflowsAuthPolicy
227+
Policy name: POP-Policy
228+
Policy type: (Preview) AADPOP
230229
231230
|Claim |Value |
232231
|---------|---------|
233232
|Issuer | https://sts.windows.net/(Tenant ID)/ |
234233
|Audience | Application ID of your Logic Apps Managed Identity |
235234
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
235+
|m | POST |
236+
|u | management.Azure.com |
237+
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(logicAppName) |
236238
237239
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
238240
@@ -246,25 +248,25 @@ If the security token type is **Normal** for your custom task extension, you'd s
246248
> [!NOTE]
247249
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
248250
249-
## Configure authorization policy for custom task extension with POP security token type
250-
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
251+
252+
## Configure authorization policy for custom task extension with normal security token type
253+
254+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
251255
252256
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
253257
254258
1. Go back to the logic app you created, and select **Authorization**.
255259
256260
1. Create two authorization policies based on these tables:
257261
258-
Policy name: POP-Policy
262+
Policy name: AzureADLifecycleWorkflowsAuthPolicy
263+
Policy type: AAD
259264
260265
|Claim |Value |
261266
|---------|---------|
262267
|Issuer | https://sts.windows.net/(Tenant ID)/ |
263268
|Audience | Application ID of your Logic Apps Managed Identity |
264269
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
265-
|m | POST |
266-
|u | management.Azure.com |
267-
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(logicAppName) |
268270
269271
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
270272
@@ -278,7 +280,6 @@ If the security token type is **Proof of Possession (POP)** for your custom task
278280
> [!NOTE]
279281
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
280282
281-
282283
> [!CAUTION]
283284
> Please pay attention to the details as minor differences can lead to problems later.
284285
- For Issuer, ensure you did include the slash after your Tenant ID

0 commit comments

Comments
 (0)