Skip to content

Commit a18e59d

Browse files
authored
Merge pull request #206479 from xuehongg/mybranch3
Clarify that only only system-assigned managed identity will work
2 parents cb1e3a5 + 4e260d0 commit a18e59d

File tree

2 files changed

+8
-9
lines changed

2 files changed

+8
-9
lines changed

articles/connectors/connectors-create-api-azureblobstorage.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
8-
ms.date: 05/28/2022
8+
ms.date: 07/30/2022
99
tags: connectors
1010
---
1111

@@ -293,7 +293,7 @@ You can add network security to an Azure storage account by [restricting access
293293

294294
- To access storage accounts behind firewalls using the Azure Blob Storage managed connector in Consumption, Standard, and ISE-based logic apps, review the following documentation:
295295

296-
- [Access storage accounts in same region with managed identities](#access-blob-storage-in-same-region-with-managed-identities)
296+
- [Access storage accounts in same region with system-managed identities](#access-blob-storage-in-same-region-with-system-managed-identities)
297297

298298
- [Access storage accounts in other regions](#access-storage-accounts-in-other-regions)
299299

@@ -345,7 +345,7 @@ To add your outbound IP addresses to the storage account firewall, follow these
345345

346346
You don't have to create a private endpoint. You can just permit traffic through the ISE outbound IPs on the storage account.
347347

348-
### Access Blob Storage in same region with managed identities
348+
### Access Blob Storage in same region with system-managed identities
349349

350350
To connect to Azure Blob Storage in any region, you can use [managed identities for authentication](../active-directory/managed-identities-azure-resources/overview.md). You can create an exception that gives Microsoft trusted services, such as a managed identity, access to your storage account through a firewall.
351351

@@ -360,10 +360,9 @@ To use managed identities in your logic app to access Blob Storage, follow these
360360
> [!NOTE]
361361
> Limitations for this solution:
362362
>
363-
> - You must set up a managed identity to authenticate your storage account connection.
363+
> - To authenticate your storage account connection, you have to set up a system-assigned managed identity.
364+
> A user-assigned managed identity won't work.
364365
>
365-
> - For Standard logic apps in the single-tenant Azure Logic Apps environment, only the system-assigned
366-
> managed identity is available and supported, not the user-assigned managed identity.
367366
368367
#### Configure storage account access
369368

articles/logic-apps/create-managed-service-identity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
8-
ms.date: 07/14/2022
8+
ms.date: 07/30/2022
99
ms.custom: devx-track-azurepowershell, subject-rbac-steps, ignite-fall-2021
1010
---
1111

@@ -706,8 +706,8 @@ The built-in HTTP trigger or action can use the system-assigned identity that yo
706706
As a specific example, suppose that you want to run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob) on a blob in the Azure Storage account where you previously set up access for your identity. However, the [Azure Blob Storage connector](/connectors/azureblob/) doesn't currently offer this operation. Instead, you can run this operation by using the [HTTP action](logic-apps-workflow-actions-triggers.md#http-action) or another [Blob Service REST API operation](/rest/api/storageservices/operations-on-blobs).
707707

708708
> [!IMPORTANT]
709-
> To access Azure storage accounts behind firewalls by using HTTP requests and managed identities,
710-
> make sure that you also set up your storage account with the [exception that allows access by trusted Microsoft services](../connectors/connectors-create-api-azureblobstorage.md#access-blob-storage-in-same-region-with-managed-identities).
709+
> To access Azure storage accounts behind firewalls by using the Azure Blob connector and managed identities,
710+
> make sure that you also set up your storage account with the [exception that allows access by trusted Microsoft services](../connectors/connectors-create-api-azureblobstorage.md#access-blob-storage-in-same-region-with-system-managed-identities).
711711
712712
To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), the HTTP action specifies these properties:
713713

0 commit comments

Comments
 (0)