Skip to content

Commit a0389f2

Browse files
committed
Clarity updates for Azure AD setup
1 parent 63ea1fd commit a0389f2

File tree

1 file changed

+27
-23
lines changed

1 file changed

+27
-23
lines changed

articles/logic-apps/logic-apps-azure-functions.md

Lines changed: 27 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -287,12 +287,11 @@ To set up and use your logic app's managed identity to authenticate function cal
287287

288288
## Set up Azure AD authentication for your function app
289289

290-
Before you start this task, find and save the following values aside for later use. The following sections show how to find these values.
290+
Before you start this task, find and save the following values so that you can set up Azure AD authentication on your function app. The following sections show how to find these values.
291291

292292
* The object (principal) ID for your logic app's managed identity
293293
* The tenant ID for your Azure Active Directory (Azure AD)
294294
* Client secret (optional)
295-
* The application ID URI (resource ID) for your function app
296295

297296
### Find the object ID for your logic app's managed identity
298297

@@ -342,30 +341,23 @@ If your logic app doesn't have a managed identity set up yet, [enable the manage
342341

343342
### Find the tenant ID for your Azure AD
344343

345-
1. For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
346-
347-
1. In the [Azure portal](https://portal.azure.com), open your Azure AD tenant. These steps use "Fabrikam" as the example tenant.
348-
349-
1. On the tenant menu, under **Manage**, select **Properties**.
344+
For your Azure Active Directory (Azure AD), find the tenant ID. You can either run the PowerShell command named [**Get-AzureAccount**](/powershell/module/servicemanagement/azure.service/get-azureaccount), or in the Azure portal, follow these steps:
350345

351-
1. Copy your tenant ID, for example, and save that ID for later use.
346+
1. In the [Azure portal](https://portal.azure.com), open your Azure AD tenant. These steps use **Fabrikam** as the example tenant.
352347

353-
![Screenshot showing your Azure AD "Properties" pane with tenant ID's copy button selected.](./media/logic-apps-azure-functions/azure-active-directory-tenant-id.png)
348+
1. On the Azure AD tenant menu, under **Manage**, select **Properties**.
354349

355-
1. For the target resource that you want to access, which is your function app in this case, find the application ID URI (resource ID).
350+
1. Copy and save your tenant ID for later use, for example:
356351

357-
* To find these resource IDs, review the [Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
352+
![Screenshot showing your Azure AD "Properties" pane with tenant ID's copy button selected.](./media/logic-apps-azure-functions/azure-active-directory-tenant-id.png)
358353

359-
> [!IMPORTANT]
360-
> This resource ID must exactly match the value that Azure AD expects, including any required trailing slashes.
354+
### Create an app registration for your function app
361355

362-
This resource ID is also the same value that you later use in the **Audience** property when you [set up your function action to use the system-assigned identity](create-managed-service-identity.md#authenticate-access-with-identity).
363-
364-
Now you're ready to set up Azure AD authentication for your function app by creating a new app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
356+
Now you're ready to set up Azure AD authentication for your function app by creating an app registration. For more information, review [Configure your App Service or Azure Functions app to use Azure AD login](../app-service/configure-authentication-provider-aad.md#-enable-azure-active-directory-in-your-app-service-app).
365357

366358
1. In the [Azure portal](https://portal.azure.com), open your function app.
367359

368-
1. On the function app menu, under **Settings**, select **Authentication**, then select **Add identity provider**.
360+
1. On the function app menu, under **Settings**, select **Authentication**, and then select **Add identity provider**.
369361

370362
![Screenshot showing function app menu with "Authentication" pane and "Add identity provider" selected.](./media/logic-apps-azure-functions/open-authentication-pane.png)
371363

@@ -375,12 +367,12 @@ Now you're ready to set up Azure AD authentication for your function app by crea
375367

376368
1. For **App registration type**, select **Provide the details of an existing app registration**, and provide the previously saved information:
377369

378-
| Property | Value | Description |
379-
|----------|-------|-------------|
380-
| **Application (client) ID** | <*object-ID*> | The object ID for your logic app's system-assigned identity |
381-
| **Client secret** | <*client-secret*> | (Recommended) The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
382-
| **Issuer URL** | `https://sts.windows.net/<Azure-AD-tenant-ID>` | The issuer URL appended with your Azure AD tenant ID |
383-
| **Allowed token audiences** | <*application-resource-ID-URI*> | The resource ID URI for the target resource that you want to access. This resource ID is the same **Audience** property value that you use later when you [set up your function action in your workflow to use the system-assigned identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). |
370+
| Property | Required | Value | Description |
371+
|----------|----------|-------|-------------|
372+
| **Application (client) ID** | Yes | <*object-ID*> | The object ID for your logic app's managed identity. |
373+
| **Client secret** | <*client-secret*> | No, but recommended | The secret value that the app uses to prove its identity when requesting a token. The client secret is created and stored as a slot-sticky [app setting](../app-service/configure-common.md#configure-app-settings) named `MICROSOFT_PROVIDER_AUTHENTICATION_SECRET`. If you want to manage the secret in Azure Key Vault, you can update this setting later to use Key Vault references. |
374+
| **Issuer URL** | No | `https://sts.windows.net/<Azure-AD-tenant-ID>` | The issuer URL appended with your Azure AD tenant ID |
375+
| **Allowed token audiences** | No | <*application-ID-URI*> | The application ID URI (resource ID) for the function app. Later, you use this same URI in the **Audience** property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity). <p><p>In this example, the value is **https://management.azure.com**. |
384376
||||
385377

386378
At this point, your version looks similar to this example:
@@ -395,6 +387,18 @@ Now you're ready to set up Azure AD authentication for your function app by crea
395387

396388
When you're done, the **Authentication** page now lists the identity provider. From here, you can edit or delete this provider configuration. You're now ready to use the Microsoft identity platform for authentication in your function app.
397389

390+
### Find the application ID URI (resource ID) for your function app
391+
392+
393+
* The application ID URI (resource ID) for your function app
394+
395+
For the function app that you want to access with the managed identity, get the application ID URI (resource ID). To find this application ID URI, review
396+
397+
> [!IMPORTANT]
398+
> This application ID URI (resource ID) must exactly match the value that Azure AD expects,
399+
> including any required trailing slashes. Later, you use this same URI in the **Audience**
400+
> property when you [set up your function action in your workflow to use the managed identity for authentication](create-managed-service-identity.md#authenticate-access-with-identity).
401+
398402
1. Return to the designer and follow the [steps to authenticate access with the managed identity](create-managed-service-identity.md#authenticate-access-with-identity).
399403

400404
## Next steps

0 commit comments

Comments
 (0)