Skip to content

Commit adc56c7

Browse files
author
ecfan
committed
Security guidance clarity edits
1 parent 3920e56 commit adc56c7

File tree

2 files changed

+9
-19
lines changed

2 files changed

+9
-19
lines changed

articles/connectors/connectors-create-api-mq.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,11 @@ Based on whether you use the MQ managed connector (Consumption or Standard workf
3838

3939
| Authentication | Supported logic app type and MQ connector | Process |
4040
|----------------|-------------------------------------------|---------|
41-
| Server only <br>(one-way) | - Consumption: Managed only <br><br>- Standard: Managed or built-in | For server authentication, your MQ server sends a private key certificate, either publicly trusted or non-publicly trusted, to your logic app client for validation. The MQ connector validates the incoming server certificate for authenticity against public key certificates, known also as a "signer" certificates, by using standard .NET SSL stream validation. <br><br>The logic app doesn't send a client certificate. |
41+
| Server only <br>(one-way) | - Consumption: Managed only <br><br>- Standard: Managed or built-in | For server authentication, your MQ server sends a private key certificate, either publicly trusted or non-publicly trusted, to your logic app client for validation. The MQ connector validates the incoming server certificate for authenticity against public key certificates, also known as *signer certificates*, by using standard .NET SSL stream validation. <br><br>The logic app workflow doesn't send a client certificate. |
4242
| Server-client <br>(two-way) | - Consumption: Not supported <br><br>- Standard: Built-in only | For server authentication, see the previous row. <br><br>For client authentication, the logic app client sends a private key certificate to your MQ server for validation. The MQ server validates the incoming client certificate for authenticity also by using a public key certificate. |
4343

44+
[!INCLUDE [secrets-guidance](../logic-apps/includes/secrets-guidance.md)]
45+
4446
### Notes about private key and public key certificates
4547

4648
- The certificate that requires validation is always a private key certificate. The certificate used to perform the validation is always a public key certificate.
@@ -266,8 +268,6 @@ To check that the thumbprints for the required public key certificates exist on
266268

267269
Follow these steps to add a public key certificate to the Trusted Root CA Store on the virtual machine host where your Standard logic app runs.
268270

269-
[!INCLUDE [secrets-guidance](../logic-apps/includes/secrets-guidance.md)]
270-
271271
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource. On the logic app resource menu, under **Settings**, select **Certificates**.
272272

273273
1. Select the **Public key certificates (.cer)** tab, and then select **Add certificate**.
@@ -298,8 +298,6 @@ Follow these steps to add a public key certificate to the Trusted Root CA Store
298298

299299
Follow these steps to add a private key certificate to the Trusted Root CA Store on virtual machine host where your Standard logic app runs.
300300

301-
[!INCLUDE [secrets-guidance](../logic-apps/includes/secrets-guidance.md)]
302-
303301
1. In the [Azure portal](https://portal.azure.com), open your logic app resource. On the logic app resource menu, under **Settings**, select **Certificates**.
304302

305303
1. Select the **Bring your own certificates (.pfx)** tab, and then select **Add certificate**.

articles/logic-apps/includes/secrets-guidance.md

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -8,17 +8,9 @@ ms.date: 01/07/2025
88

99
> [!IMPORTANT]
1010
>
11-
> In production environments, always protect sensitive information and secrets, such as credentials,
12-
> certificates, thumbprints, access keys, and connection strings. Make sure that you securely store such information
13-
> by using Microsoft Entra ID and [Azure Key Vault](https://go.microsoft.com/fwlink/?linkid=2300117).
14-
> Avoid hardcoding this information, sharing with other users, or saving in plain text anywhere others
15-
> can access. Rotate your secrets as soon as possible if you think this information might be compromised.
16-
> For more information, see [About Azure Key Vault](/azure/key-vault/general/overview).
17-
>
18-
> For authentication, use [Microsoft Entra ID](/entra/identity/authentication/overview-authentication) with
19-
> [managed identities](/entra/identity/managed-identities-azure-resources/overview) whenever possible.
20-
> This method provides optimal and superior security without having to provide credentials. Azure manages
21-
> this identity for you and helps keep authentication information secure so that you don't have to manage
22-
> this sensitive information. To set up a managed identity for Azure Logic Apps, see
23-
> [Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/authenticate-with-managed-identity).
24-
>
11+
> In production environments, always protect sensitive information and secrets, such as credentials, certificates,
12+
> thumbprints, access keys, and connection strings. Make sure that you securely store such information by using
13+
> Microsoft Entra ID and [Azure Key Vault](https://go.microsoft.com/fwlink/?linkid=2300117). Avoid hardcoding
14+
> this information, sharing with other users, or saving in plain text anywhere that others can access. Rotate your
15+
> secrets as soon as possible if you think this information might be compromised. For more information, see
16+
> [About Azure Key Vault](/azure/key-vault/general/overview).

0 commit comments

Comments
 (0)