You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+31-26Lines changed: 31 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -725,29 +725,7 @@ In a Standard logic app workflow that starts with the Request trigger (but not a
725
725
726
726
* An inbound call to the request endpoint can use only one authorization scheme, either Azure AD OAuth or [Shared Access Signature (SAS)](#sas). Although using one scheme doesn't disable the other scheme, using both schemes at the same time causes an error because Azure Logic Apps doesn't know which scheme to choose.
727
727
728
-
* Azure Logic Apps supports either [bearer type](../active-directory/develop/active-directory-v2-protocols.md#tokens) or [proof-of-possession type (Consumption logic app only)](/entra/msal/dotnet/advanced/proof-of-possession-tokens) authorization schemes for Azure AD OAuth access tokens. So, the `Authorization` header for the access token must specify either the `Bearer` type or `PoP` type. For more information about how to get and use a PoP token, see [Get a Proof of Possession (PoP) token](#get-pop).
729
-
730
-
To enable Azure AD OAuth so that this option is the only way to call the request endpoint, use the following steps:
731
-
732
-
1. To enable the capability to check the OAuth access token, [follow the steps to include 'Authorization' header in the Request or HTTP webhook trigger outputs](#include-auth-header).
733
-
734
-
> [!NOTE]
735
-
>
736
-
> This step makes the `Authorization` header visible in the workflow's run history
737
-
> and in the trigger's outputs.
738
-
739
-
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
740
-
741
-
1. On the trigger, in the upper right corner, select the ellipses (**...**) button, and then select **Settings**.
742
-
743
-
1. Under **Trigger Conditions**, select **Add**. In the trigger condition box, enter the following expression, and select **Done**.
> If you call the trigger endpoint without the correct authorization,
749
-
> the run history just shows the trigger as `Skipped` without any
750
-
> message that the trigger condition has failed.
728
+
* Azure Logic Apps supports either the [bearer type](../active-directory/develop/active-directory-v2-protocols.md#tokens) or [proof-of-possession type (Consumption logic app only)](/entra/msal/dotnet/advanced/proof-of-possession-tokens) authorization schemes for Azure AD OAuth access tokens. However, the `Authorization` header for the access token must specify either the `Bearer` type or `PoP` type. For more information about how to get and use a PoP token, see [Get a Proof of Possession (PoP) token](#get-pop).
751
729
752
730
* Your logic app resource is limited to a maximum number of authorization policies. Each authorization policy also has a maximum number of [claims](../active-directory/develop/developer-glossary.md#claim). For more information, review [Limits and configuration for Azure Logic Apps](../logic-apps/logic-apps-limits-and-config.md#authentication-limits).
753
731
@@ -796,13 +774,40 @@ In a Standard logic app workflow that starts with the Request trigger (but not a
796
774
}
797
775
```
798
776
777
+
#### Enable Azure AD OAuth as the only option to call a request endpoint
778
+
779
+
1. Set up your Request or HTTP webhook trigger with the capability to check the OAuth access token by [following the steps to include the 'Authorization' header in the Request or HTTP webhook trigger outputs](#include-auth-header).
780
+
781
+
> [!NOTE]
782
+
>
783
+
> This step makes the `Authorization` header visible in the
784
+
> workflow's run history and in the trigger's outputs.
785
+
786
+
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
787
+
788
+
1. On the trigger, in the upper right corner, select the ellipses (**...**) button, and then select **Settings**.
789
+
790
+
1. Under **Trigger Conditions**, select **Add**. In the trigger condition box, enter either of the following expressions, based on the token type you want to use, and select **Done**.
If you call the trigger endpoint without the correct authorization, the run history just shows the trigger as `Skipped` without any message that the trigger condition has failed.
799
+
799
800
<aname="get-pop"></a>
800
801
801
-
### Get a Proof-of-Possession (PoP) token
802
+
#### Get a Proof-of-Possession (PoP) token
803
+
804
+
The Microsoft Authentication Library (MSAL) libraries provide PoP tokens for you to use. If the logic app workflow that you want to call requires a PoP token, you can get this token using the MSAL libraries. The following samples show how to acquire PoP tokens:
805
+
806
+
*[A .NET Core daemon console application calling a protected Web API with its own identity](https://github.com/Azure-Samples/active-directory-dotnetcore-daemon-v2/tree/master/2-Call-OwnApi)
802
807
803
-
PoP tokens are now available in the MSAL libraries. If the logic app workflow that you want to call requires the Proof-of-Possession token, you can use MSAL to get the token.
808
+
*[SignedHttpRequest aka PoP (Proof of Possession)](https://github.com/AzureAD/azure-activedirectory-identitymodel-extensions-for-dotnet/wiki/SignedHttpRequest-aka-PoP-(Proof-of-Possession))
804
809
805
-
To use the PoP token with your Consumption logic app, follow the next section to [enable Azure AD OAuth](#enable-azure-ad-inbound).
810
+
To use the PoP token with your Consumption logic app, follow the next section to [set up Azure AD OAuth](#enable-azure-ad-inbound).
0 commit comments