Skip to content

Commit a8243d8

Browse files
authored
Merge pull request #7 from ecfan/patch-1
Incorporated note into properties table
2 parents 2e47e65 + f96d000 commit a8243d8

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -663,15 +663,12 @@ In the [Azure portal](https://portal.azure.com), add one or more authorization p
663663

664664
![Provide information for authorization policy](./media/logic-apps-securing-a-logic-app/set-up-authorization-policy.png)
665665

666-
| Property | Required | Description |
667-
|----------|----------|-------------|
668-
| **Policy name** | Yes | The name that you want to use for the authorization policy |
669-
| **Claims** | Yes | The claim types and values that your logic app accepts from inbound calls. The claim value is limited to a [maximum number of characters](logic-apps-limits-and-config.md#authentication-limits). Here are the available claim types: <p><p>- **Issuer** <br>- **Audience** <br>- **Subject** <br>- **JWT ID** (JSON Web Token identifier) <p><p>At a minimum, the **Claims** list must include the **Issuer** claim, which has a value that starts with `https://sts.windows.net/` or `https://login.microsoftonline.com/` as the Azure AD issuer ID. For more information about these claim types, review [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios.md#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value. |
666+
| Property | Required | Type | Description |
667+
|----------|----------|------|-------------|
668+
| **Policy name** | Yes | String | The name that you want to use for the authorization policy |
669+
| **Claims** | Yes | String | The claim types and values that your workflow accepts from inbound calls. Here are the available claim types: <br><br>- **Issuer** <br>- **Audience** <br>- **Subject** <br>- **JWT ID** (JSON Web Token identifier) <br><br>Requirements: <br><br>- At a minimum, the **Claims** list must include the **Issuer** claim, which has a value that starts with `https://sts.windows.net/` or `https://login.microsoftonline.com/` as the Azure AD issuer ID. <br>- Each claim must be a single string value, not an array of values. For example, you can have a claim with **Role** as the type and **Developer** as the value. You can't have a claim that has **Role** as the type and the values set to **Developer** and **Program Manager**. <br>- The claim value is limited to a [maximum number of characters](logic-apps-limits-and-config.md#authentication-limits). <br><br>For more information about these claim types, review [Claims in Azure AD security tokens](../active-directory/azuread-dev/v1-authentication-scenarios.md#claims-in-azure-ad-security-tokens). You can also specify your own claim type and value. |
670670
|||
671671

672-
> [!IMPORTANT]
673-
> Each claim can only be a single string value. Array value is not supported.
674-
675672
1. To add another claim, select from these options:
676673

677674
* To add another claim type, select **Add standard claim**, select the claim type, and specify the claim value.

0 commit comments

Comments
 (0)