You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-azure-functions.md
+27-23Lines changed: 27 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -287,12 +287,11 @@ To set up and use your logic app's managed identity to authenticate function cal
287
287
288
288
## Set up Azure AD authentication for your function app
289
289
290
-
Before you start this task, find and save the following values aside for later use. The following sections show how to find these values.
290
+
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following sections show how to find these values.
291
291
292
292
* The object (principal) ID for your logic app's managed identity
293
293
* The tenant ID for your Azure Active Directory (Azure AD)
294
294
* Client secret (optional)
295
-
* The application ID URI (resource ID) for your function app
296
295
297
296
### Find the object ID for your logic app's managed identity
298
297
@@ -342,30 +341,23 @@ If your logic app doesn't have a managed identity set up yet, [enable the manage
342
341
343
342
### Find the tenant ID for your Azure AD
344
343
345
-
1. For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
346
-
347
-
1. In the [Azure portal](https://portal.azure.com), open your Azure AD tenant. These steps use "Fabrikam" as the example tenant.
348
-
349
-
1. On the tenant menu, under **Manage**, select **Properties**.
344
+
For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
350
345
351
-
1. Copy your tenant ID, for example, and save that ID for later use.
346
+
1. In the [Azure portal](https://portal.azure.com), open your Azure AD tenant. These steps use **Fabrikam** as the example tenant.
352
347
353
-

348
+
1. On the Azure AD tenant menu, under **Manage**, select **Properties**.
354
349
355
-
1.For the target resource that you want to access, which is your function app in this case, find the application ID URI (resource ID).
350
+
1.Copy and save your tenant ID for later use, for example:
356
351
357
-
* To find these resource IDs, review the [Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
352
+

358
353
359
-
> [!IMPORTANT]
360
-
> This resource ID must exactly match the value that Azure AD expects, including any required trailing slashes.
354
+
### Create an app registration for your function app
361
355
362
-
This resource ID is also the same value that you later use in the **Audience** property when you [set up your function action to use the system-assigned identity](create-managed-service-identity.md#authenticate-access-with-identity).
363
-
364
-
Now you're ready to set up Azure AD authentication for your function app by creating a new app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
356
+
Now you're ready to set up Azure AD authentication for your function app by creating an app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
365
357
366
358
1. In the [Azure portal](https://portal.azure.com), open your function app.
367
359
368
-
1. On the function app menu, under **Settings**, select **Authentication**, then select **Add identity provider**.
360
+
1. On the function app menu, under **Settings**, select **Authentication**, and then select **Add identity provider**.
369
361
370
362

371
363
@@ -375,12 +367,12 @@ Now you're ready to set up Azure AD authentication for your function app by crea
375
367
376
368
1. For **App registration type**, select **Provide the details of an existing app registration**, and provide the previously saved information:
377
369
378
-
| Property | Value | Description |
379
-
|----------|-------|-------------|
380
-
|**Application (client) ID**| <*object-ID*> | The object ID for your logic app's system-assigned identity |
381
-
|**Client secret**| <*client-secret*> |(Recommended) The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
382
-
|**Issuer URL**|`https://sts.windows.net/<Azure-AD-tenant-ID>`| The issuer URL appended with your Azure AD tenant ID |
383
-
|**Allowed token audiences**| <*application-resource-ID-URI*> | The resource ID URI for the target resource that you want to access. This resource ID is the same **Audience** property value that you use later when you [set up your function action in your workflow to use the system-assigned identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). |
370
+
| Property |Required |Value | Description |
371
+
|----------|----------|-------|-------------|
372
+
|**Application (client) ID**|Yes |<*object-ID*> | The object ID for your logic app's managed identity.|
373
+
|**Client secret**| <*client-secret*> |No, but recommended | The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
374
+
|**Issuer URL**|No |`https://sts.windows.net/<Azure-AD-tenant-ID>`| The issuer URL appended with your Azure AD tenant ID |
375
+
|**Allowed token audiences**|No |<*application-ID-URI*> | The application ID URI (resource ID) for the function app. Later, you use this same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>In this example, the value is **https://management.azure.com**.|
384
376
||||
385
377
386
378
At this point, your version looks similar to this example:
@@ -395,6 +387,18 @@ Now you're ready to set up Azure AD authentication for your function app by crea
395
387
396
388
When you're done, the **Authentication** page now lists the identity provider. From here, you can edit or delete this provider configuration. You're now ready to use the Microsoft identity platform for authentication in your function app.
397
389
390
+
### Find the application ID URI (resource ID) for your function app
391
+
392
+
393
+
* The application ID URI (resource ID) for your function app
394
+
395
+
For the function app that you want to access with the managed identity, get the application ID URI (resource ID). To find this application ID URI, review
396
+
397
+
> [!IMPORTANT]
398
+
> This application ID URI (resource ID) must exactly match the value that Azure AD expects,
399
+
> including any required trailing slashes. Later, you use this same URI in the **Audience**
400
+
> property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity).
401
+
398
402
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity).
0 commit comments