Skip to content

Commit 7f5bb49

Browse files
authored
Merge pull request #231226 from OWinfreyATL/owinfreyATL-Trigger-Workflows
Configure Logic Apps for workflow use update
2 parents 5e47667 + efcac3e commit 7f5bb49

File tree

2 files changed

+63
-11
lines changed

2 files changed

+63
-11
lines changed

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 63 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: owinfreyATL
55
ms.author: owinfrey
66
ms.service: active-directory
77
ms.topic: reference
8-
ms.date: 01/26/2023
8+
ms.date: 03/17/2023
99
ms.custom: template-how-to
1010
---
1111

@@ -15,16 +15,32 @@ ms.custom: template-how-to
1515

1616
Before you can use an existing Azure Logic App with the custom task extension feature of Lifecycle Workflows, it must first be made compatible. This reference guide provides a list of steps that must be taken to make the Azure Logic App compatible. For a guide on creating a new compatible Logic App via the Lifecycle Workflows portal, see [Trigger Logic Apps based on custom task extensions (preview)](trigger-custom-task.md).
1717

18+
## Determine type of token security of your custom task extension
19+
20+
Before configuring your Azure Logic App custom extension for use with Lifecycle Workflows, you must first figure out what type of token security it has. The two token security types can either be:
21+
22+
- Normal
23+
- Proof of Possession(POP)
24+
25+
26+
To determine the security token type of your custom task extension, you'd check the **Custom extensions (Preview)** page:
27+
28+
:::image type="content" source="media/configure-logic-app-lifecycle-workflows/custom-task-extension-token-type.png" alt-text="Screenshot of custom task extension and token type.":::
29+
30+
31+
> [!NOTE]
32+
> New custom task extensions will only have Proof of Possession(POP) token security type. Only task extensions created before the inclusion of the Proof of Possession token security type will have a type of Normal.
33+
1834
## Configure existing Logic Apps for LCW use
1935

2036
Making an Azure Logic app compatible to run with the **Custom Task Extension** requires the following steps:
2137

2238
- Configure the logic app trigger
23-
- Configure the callback action (only applicable to the callback scenario)
24-
- Enable system assigned managed identity.
25-
- Configure AuthZ policies.
39+
- Configure the callback action (Only applicable to the callback scenario.)
40+
- Enable system assigned managed identity (Always required for Normal security token type extensions. This is also the default for callback scenarios with custom task extensions. For more information on this, and other, custom task extension deployment scenarios, see: [Custom task extension deployment scenarios](lifecycle-workflow-extensibility.md#custom-task-extension-deployment-scenarios).)
41+
- Configure AuthZ policies
2642

27-
To configure those you'll follow these steps:
43+
To configure those you follow these steps:
2844

2945
1. Open the Azure Logic App you want to use with Lifecycle Workflow. Logic Apps may greet you with an introduction screen, which you can close with the X in the upper right corner.
3046

@@ -202,21 +218,59 @@ To configure those you'll follow these steps:
202218
203219
1. Select Save.
204220
205-
1. For Logic Apps authorization policy, we'll need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure portal** to find the required Application ID.
221+
## Configure authorization policy for custom task extension with POP security token type
222+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
223+
224+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
206225
207226
1. Go back to the logic app you created, and select **Authorization**.
208227
209-
1. Create two authorization policies based on the tables below:
228+
1. Create two authorization policies based on these tables:
210229
211-
Policy name: AzureADLifecycleWorkflowsAuthPolicy
230+
Policy name: POP-Policy
231+
232+
Policy type: (Preview) AADPOP
233+
234+
|Claim |Value |
235+
|---------|---------|
236+
|Issuer | https://sts.windows.net/(Tenant ID)/ |
237+
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
238+
|m | POST |
239+
|u | management.azure.com |
240+
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(LogicApp name) |
241+
242+
243+
1. Save the Authorization policy.
244+
245+
246+
> [!CAUTION]
247+
> Please pay attention to the details as minor differences can lead to problems later.
248+
- For Issuer, ensure you did include the slash after your Tenant ID
249+
- For appid, ensure the custom claim is “appid” in all lowercase. The appid value represents Lifecycle Workflows and is always the same.
250+
251+
## Configure authorization policy for custom task extension with normal security token type
252+
253+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
254+
255+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
256+
257+
1. Go back to the logic app you created, and select **Authorization**.
258+
259+
1. Create two authorization policies based on these tables:
260+
261+
Policy name: AzureADLifecycleWorkflowsAuthPolicy
262+
263+
Policy type: AAD
212264
213265
|Claim |Value |
214266
|---------|---------|
215267
|Issuer | https://sts.windows.net/(Tenant ID)/ |
216268
|Audience | Application ID of your Logic Apps Managed Identity |
217269
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
218270
219-
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
271+
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
272+
273+
Policy type: AAD
220274
221275
|Claim |Value |
222276
|---------|---------|
@@ -225,8 +279,6 @@ To configure those you'll follow these steps:
225279
|azp | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
226280
227281
1. Save the Authorization policy.
228-
> [!NOTE]
229-
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
230282
231283
> [!CAUTION]
232284
> Please pay attention to the details as minor differences can lead to problems later.
Loading

0 commit comments

Comments
 (0)