You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
##customerIntent: As a logic app developer, I want to authenticate connections for my logic app workflow using a managed identity so I don't have to use credentials or secrets.
@@ -520,21 +520,27 @@ Before you can use your logic app's managed identity for authentication, you hav
520
520
> suppose you have a managed identity for a logic app that needs access to update the application
521
521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522
522
523
-
For example, to access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account. The steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
523
+
For example, to access an Azure key vault with your managed identity, you have multiple options:
524
524
525
-
| Tool | Documentation |
526
-
|------|---------------|
527
-
| Azure PowerShell |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell)|
528
-
| Azure CLI |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli)|
529
-
| Azure REST API |[Add role assignment](../role-based-access-control/role-assignments-rest.md)|
525
+
- Set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the key vault.
530
526
531
-
However, to access an Azure key vault with your managed identity, you have to create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
527
+
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
| Azure PowerShell |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell)|
537
-
| Azure CLI |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli)|
529
+
| Tool | Documentation |
530
+
|------|---------------|
531
+
| Azure PowerShell |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell)|
532
+
| Azure CLI |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli)|
533
+
| Azure REST API |[Add role assignment](../role-based-access-control/role-assignments-rest.md)|
534
+
535
+
- Create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
| Azure PowerShell |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell)|
541
+
| Azure CLI |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli)|
542
+
543
+
To access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account.
0 commit comments