You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,24 +215,26 @@ To configure those you follow these steps:
215
215
216
216
1. Select Save.
217
217
218
-
219
-
## Configure authorization policy for custom task extension with normal security token type
220
-
221
-
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
218
+
## Configure authorization policy for custom task extension with POP security token type
219
+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
222
220
223
221
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
224
222
225
223
1. Go back to the logic app you created, and select **Authorization**.
226
224
227
225
1. Create two authorization policies based on these tables:
228
226
229
-
Policy name: AzureADLifecycleWorkflowsAuthPolicy
227
+
Policy name: POP-Policy
228
+
Policy type: (Preview) AADPOP
230
229
231
230
|Claim |Value |
232
231
|---------|---------|
233
232
|Issuer | https://sts.windows.net/(Tenant ID)/ |
234
233
|Audience | Application ID of your Logic Apps Managed Identity |
@@ -246,25 +248,25 @@ If the security token type is **Normal** for your custom task extension, you'd s
246
248
> [!NOTE]
247
249
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
248
250
249
-
## Configure authorization policy for custom task extension with POP security token type
250
-
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
251
+
252
+
## Configure authorization policy for custom task extension with normal security token type
253
+
254
+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
251
255
252
256
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
253
257
254
258
1. Go back to the logic app you created, and select **Authorization**.
255
259
256
260
1. Create two authorization policies based on these tables:
257
261
258
-
Policy name: POP-Policy
262
+
Policy name: AzureADLifecycleWorkflowsAuthPolicy
263
+
Policy type: AAD
259
264
260
265
|Claim |Value |
261
266
|---------|---------|
262
267
|Issuer | https://sts.windows.net/(Tenant ID)/ |
263
268
|Audience | Application ID of your Logic Apps Managed Identity |
0 commit comments