Skip to content

Commit 9f5ef5f

Browse files
committed
Updates
1 parent 2ec6f10 commit 9f5ef5f

File tree

1 file changed

+11
-13
lines changed

1 file changed

+11
-13
lines changed

articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,16 @@ To determine the security token type of your custom task extension, you'd check
2828
:::image type="content" source="media/configure-logic-app-lifecycle-workflows/custom-task-extension-token-type.png" alt-text="Screenshot of custom task extension and token type.":::
2929

3030

31+
> [!NOTE]
32+
> New custom task extensions will only have Proof of Possession(POP) token security type. Only task extensions created before the inclusion of the Proof of Possession token security type will have a type of Normal.
33+
3134
## Configure existing Logic Apps for LCW use
3235

3336
Making an Azure Logic app compatible to run with the **Custom Task Extension** requires the following steps:
3437

3538
- Configure the logic app trigger
36-
- Configure the callback action (only applicable to the callback scenario)
37-
- Enable system assigned managed identity.
39+
- Configure the callback action (Only applicable to the callback scenario.)
40+
- Enable system assigned managed identity (Always required for Normal security token type extensions. This is also the default for callback scenarios with custom task extensions. For more information on this, and other, custom task extension deployment scenarios, see: [Custom task extension deployment scenarios](lifecycle-workflow-extensibility.md#custom-task-extension-deployment-scenarios).)
3841
- Configure AuthZ policies.
3942

4043
To configure those you follow these steps:
@@ -231,26 +234,21 @@ If the security token type is **Proof of Possession (POP)** for your custom task
231234
|Claim |Value |
232235
|---------|---------|
233236
|Issuer | https://sts.windows.net/(Tenant ID)/ |
234-
|Audience | Application ID of your Logic Apps Managed Identity |
235237
|appid | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
236238
|m | POST |
237-
|u | management.Azure.com |
239+
|u | management.azure.com |
238240
|p | /subscriptions/(subscriptionId)/resourceGroups/(resourceGroupName)/providers/Microsoft.Logic/workflows/(logicAppName) |
239241
240-
Policy name: AzureADLifecycleWorkflowsAuthPolicyV2App
241-
242-
Policy type: AAD
243-
244-
|Claim |Value |
245-
|---------|---------|
246-
|Issuer | https://login.microsoftonline.com/(Tenant ID)/v2.0 |
247-
|Audience | Application ID of your Logic Apps Managed Identity |
248-
|azp | ce79fdc4-cd1d-4ea5-8139-e74d7dbe0bb7 |
249242
250243
1. Save the Authorization policy.
251244
> [!NOTE]
252245
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
253246
247+
> [!CAUTION]
248+
> Please pay attention to the details as minor differences can lead to problems later.
249+
- For Issuer, ensure you did include the slash after your Tenant ID
250+
- For appid, ensure the custom claim is “appid” in all lowercase. The appid value represents Lifecycle Workflows and is always the same.
251+
254252
## Configure authorization policy for custom task extension with normal security token type
255253
256254
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:

0 commit comments

Comments
 (0)