Skip to content

Commit 7e0b2a5

Browse files
Merge pull request #268179 from ecfan/patch-1
Update and add links to use role-based access control, not access policies
2 parents b50105d + 21ad166 commit 7e0b2a5

File tree

1 file changed

+8
-11
lines changed

1 file changed

+8
-11
lines changed

articles/logic-apps/logic-apps-enterprise-integration-certificates.md

Lines changed: 8 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: divyaswarnkar
77
ms.author: divswa
88
ms.reviewer: estfan, azla
99
ms.topic: how-to
10-
ms.date: 01/04/2024
10+
ms.date: 03/05/2024
1111
---
1212

1313
# Add certificates to integration accounts for securing messages in workflows with Azure Logic Apps
@@ -40,25 +40,22 @@ If you're new to logic apps, review [What is Azure Logic Apps](logic-apps-overvi
4040

4141
* Exists in the same location or Azure region as your logic app resource.
4242

43-
* If you use the [**Logic App (Consumption)** resource type](logic-apps-overview.md#resource-environment-differences), you have to [link your integration account to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use your artifacts in your workflow.
43+
* If you have a [Consumption logic app resource](logic-apps-overview.md#resource-environment-differences), you have to [link your integration account to your logic app resource](logic-apps-enterprise-integration-create-integration-account.md#link-account) before you can use your artifacts in your workflow.
4444

4545
To create and add certificates for use in **Logic App (Consumption)** workflows, you don't need a logic app resource yet. However, when you're ready to use those certificates in your workflows, your logic app resource requires a linked integration account that stores those certificates.
4646

47-
* If you're using the [**Logic App (Standard)** resource type](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
48-
49-
> [!NOTE]
50-
> Currently, only the **Logic App (Consumption)** resource type supports [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
51-
> The **Logic App (Standard)** resource type doesn't include [RosettaNet](logic-apps-enterprise-integration-rosettanet.md) operations.
47+
* If you have a [Standard logic app resource](logic-apps-overview.md#resource-environment-differences), your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the [AS2](logic-apps-enterprise-integration-as2.md), [X12](logic-apps-enterprise-integration-x12.md), and [EDIFACT](logic-apps-enterprise-integration-edifact.md) operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
5248

5349
* For private certificates, you must meet the following prerequisites:
5450

5551
* Add a private key in [Azure Key Vault](../key-vault/general/overview.md) and have the **Key Name**. For more information, review [Add your private key to Azure Key Vault](../key-vault/certificates/certificate-scenarios.md#import-a-certificate).
5652

57-
* Authorize the Azure Logic Apps service to perform operations on your key vault. To grant access to the Azure Logic Apps service principal, use the PowerShell command, [Set-AzKeyVaultAccessPolicy](/powershell/module/az.keyvault/set-azkeyvaultaccesspolicy), for example:
53+
* Authorize the Azure Logic Apps service to perform operations on your key vault. To grant access to the Azure Logic Apps service principal, use Azure role-based access control to manage access to your key vault. For more information, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](../key-vault/general/rbac-guide.md).
5854

59-
`Set-AzKeyVaultAccessPolicy -VaultName 'TestcertKeyVault' -ServicePrincipalName '7cd684f4-8a78-49b0-91ec-6a35d38739ba' -PermissionsToKeys decrypt, sign, get, list`
60-
61-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
55+
> [!NOTE]
56+
>
57+
> If you're using access policies with your key vault, considering
58+
> [migrating to the Azure role-based access control permission model](../key-vault/general/rbac-migration.md).
6259
6360
* [Add the corresponding public certificate](#add-public-certificate) to your key vault. This certificate appears in your [agreement's **Send** and **Receive** settings for signing and encrypting messages](logic-apps-enterprise-integration-agreements.md). For example, review [Reference for AS2 messages settings in Azure Logic Apps](logic-apps-enterprise-integration-as2-message-settings.md).
6461

0 commit comments

Comments
 (0)