Skip to content

Commit 799fa0a

Browse files
author
ecfan
committed
Clarify options for key vault
1 parent 575c233 commit 799fa0a

File tree

1 file changed

+19
-13
lines changed

1 file changed

+19
-13
lines changed

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
8-
ms.date: 04/23/2024
8+
ms.date: 05/10/2024
99
ms.custom: subject-rbac-steps, devx-track-arm-template
1010

1111
##customerIntent: As a logic app developer, I want to authenticate connections for my logic app workflow using a managed identity so I don't have to use credentials or secrets.
@@ -520,21 +520,27 @@ Before you can use your logic app's managed identity for authentication, you hav
520520
> suppose you have a managed identity for a logic app that needs access to update the application
521521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522522
523-
For example, to access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account. The steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
523+
For example, to access an Azure key vault with your managed identity, you have multiple options:
524524

525-
| Tool | Documentation |
526-
|------|---------------|
527-
| Azure PowerShell | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell) |
528-
| Azure CLI | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli) |
529-
| Azure REST API | [Add role assignment](../role-based-access-control/role-assignments-rest.md) |
525+
- Set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the key vault.
530526

531-
However, to access an Azure key vault with your managed identity, you have to create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
527+
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
532528

533-
| Tool | Documentation |
534-
|------|---------------|
535-
| Azure Resource Manager template (ARM template) | [Key Vault access policy resource definition](/azure/templates/microsoft.keyvault/vaults) |
536-
| Azure PowerShell | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell) |
537-
| Azure CLI | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli) |
529+
| Tool | Documentation |
530+
|------|---------------|
531+
| Azure PowerShell | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell) |
532+
| Azure CLI | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli) |
533+
| Azure REST API | [Add role assignment](../role-based-access-control/role-assignments-rest.md) |
534+
535+
- Create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
536+
537+
| Tool | Documentation |
538+
|------|---------------|
539+
| Azure Resource Manager template (ARM template) | [Key Vault access policy resource definition](/azure/templates/microsoft.keyvault/vaults) |
540+
| Azure PowerShell | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell) |
541+
| Azure CLI | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli) |
542+
543+
To access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account.
538544

539545
<a name="azure-portal-assign-role"></a>
540546

0 commit comments

Comments
 (0)