You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/authenticate-with-managed-identity.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -520,7 +520,7 @@ Before you can use your logic app's managed identity for authentication, you hav
520
520
> suppose you have a managed identity for a logic app that needs access to update the application
521
521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522
522
523
-
For example, to access an Azure Blob storage account or an Azure key vault with your managed identity, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
523
+
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
524
524
525
525
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
526
526
@@ -530,7 +530,7 @@ The steps in this section describe how to assign role-based access using the [Az
530
530
| Azure CLI |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli)|
531
531
| Azure REST API |[Add role assignment](../role-based-access-control/role-assignments-rest.md)|
532
532
533
-
For an Azure key vault, you also have the option to create an access policy for your managed identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
533
+
For Azure Key Vault, you also have the option to create an access policy for your managed identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
534
534
535
535
| Tool | Documentation |
536
536
|------|---------------|
@@ -542,7 +542,7 @@ For an Azure key vault, you also have the option to create an access policy for
542
542
543
543
### Assign role-based access to a managed identity using the Azure portal
544
544
545
-
To use a managed identity for authentication, some Azure resources, such as Azure storage accounts, require that you assign that identity to a role that has the appropriate permissions on the target resource. Other Azure resources, such as Azure key vaults, support multiple options, so you can choose either role-based access or an [access policy that has the appropriate permissions on the target resource for that identity](#azure-portal-access-policy).
545
+
To use a managed identity for authentication, some Azure resources, such as Azure storage accounts, require that you assign that identity to a role that has the appropriate permissions on the target resource. Other Azure resources, such as key vaults, support multiple options. You can choose either role-based access or an [access policy that has the appropriate permissions on the target resource for that identity](#azure-portal-access-policy).
546
546
547
547
1. In the [Azure portal](https://portal.azure.com), open the resource where you want to use the identity.
548
548
@@ -578,7 +578,9 @@ For more general information about this task, see [Assign a managed identity acc
578
578
579
579
To use a managed identity for authentication, other Azure resources also support or require that you create an access policy that has the appropriate permissions on the target resource for that identity. Other Azure resources, such as Azure storage accounts, instead require that you [assign that identity to a role that has the appropriate permissions on the target resource](#azure-portal-assign-role).
580
580
581
-
1. In the [Azure portal](https://portal.azure.com), open the target resource where you want to use the identity. This example uses an Azure key vault as the target resource.
581
+
1. In the [Azure portal](https://portal.azure.com), open the target resource where you want to use the identity.
582
+
583
+
This example uses a key vault as the target Azure resource.
582
584
583
585
1. On the resource menu, select **Access policies** > **Create**, which opens the **Create an access policy** pane.
0 commit comments