Skip to content

Commit a00668a

Browse files
authored
Merge pull request #127790 from PramodValavala-MSFT/patch-121
(AzureCXP) fix template and add note for required claim
2 parents 9bff07d + bf3b4d2 commit a00668a

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ To enable Azure AD OAuth for your logic app in the Azure portal, follow these st
192192
| Property | Required | Description |
193193
|----------|----------|-------------|
194194
| **Policy name** | Yes | The name that you want to use for the authorization policy |
195-
| **Claims** | Yes | The claim types and values that your logic app accepts from inbound calls. Here are the available claim types: <p><p>- **Issuer** <br>- **Audience** <br>- **Subject** <br>- **JWT ID** (JSON Web Token ID) <p><p>At the minimum, the **Claims** list must include the **Issuer** claim, which has a value that starts with the `https://sts.windows.net/` or `https://login.microsoftonline.com/` as the Azure AD issuer ID. For more information about these claim types, see [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios.md#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value. |
195+
| **Claims** | Yes | The claim types and values that your logic app accepts from inbound calls. Here are the available claim types: <p><p>- **Issuer** <br>- **Audience** <br>- **Subject** <br>- **JWT ID** (JSON Web Token ID) <p><p>At the minimum, the **Claims** list must include the **Issuer** claim, which has a value that starts with `https://sts.windows.net/` or `https://login.microsoftonline.com/` as the Azure AD issuer ID. For more information about these claim types, see [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios.md#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value. |
196196
|||
197197

198198
1. To add another claim, select from these options:
@@ -211,6 +211,9 @@ To enable Azure AD OAuth for your logic app in the Azure portal, follow these st
211211

212212
To enable Azure AD OAuth in the ARM template for deploying your logic app, in the `properties` section for your [logic app's resource definition](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md#logic-app-resource-definition), add an `accessControl` object, if none exists, that contains a `triggers` object. In the `triggers` object, add an `openAuthenticationPolicies` object where you define one or more authorization policies by following this syntax:
213213

214+
> [!NOTE]
215+
> At the minimum, the `claims` array must include the `iss` claim, which has a value that starts with `https://sts.windows.net/` or `https://login.microsoftonline.com/` as the Azure AD issuer ID. For more information about these claim types, see [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios.md#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value.
216+
214217
```json
215218
"resources": [
216219
{
@@ -228,7 +231,7 @@ To enable Azure AD OAuth in the ARM template for deploying your logic app, in th
228231
"claims": [
229232
{
230233
"name": "<claim-name>",
231-
"values": "<claim-value>"
234+
"value": "<claim-value>"
232235
}
233236
]
234237
}

0 commit comments

Comments
 (0)