Skip to content

Commit ba180e6

Browse files
author
ecfan
committed
Clarity edits
1 parent 799fa0a commit ba180e6

File tree

1 file changed

+25
-23
lines changed

1 file changed

+25
-23
lines changed

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 25 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -35,11 +35,11 @@ This guide shows how to complete the following tasks:
3535

3636
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication. For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
3737

38-
| Tool | Documentation |
39-
|------|---------------|
40-
| Azure PowerShell | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell) |
41-
| Azure CLI | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli) |
42-
| Azure REST API | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-rest) |
38+
| Tool | Documentation |
39+
|------|---------------|
40+
| Azure PowerShell | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-powershell) |
41+
| Azure CLI | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azcli) |
42+
| Azure REST API | [Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-rest) |
4343

4444
## Prerequisites
4545

@@ -520,27 +520,29 @@ Before you can use your logic app's managed identity for authentication, you hav
520520
> suppose you have a managed identity for a logic app that needs access to update the application
521521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522522
523-
For example, to access an Azure key vault with your managed identity, you have multiple options:
523+
For example, to access an Azure Blob storage account or an Azure key vault with your managed identity, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
524524

525-
- Set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the key vault.
526-
527-
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
528-
529-
| Tool | Documentation |
530-
|------|---------------|
531-
| Azure PowerShell | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell) |
532-
| Azure CLI | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli) |
533-
| Azure REST API | [Add role assignment](../role-based-access-control/role-assignments-rest.md) |
525+
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
534526

535-
- Create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
536-
537-
| Tool | Documentation |
538-
|------|---------------|
539-
| Azure Resource Manager template (ARM template) | [Key Vault access policy resource definition](/azure/templates/microsoft.keyvault/vaults) |
540-
| Azure PowerShell | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell) |
541-
| Azure CLI | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli) |
527+
| Tool | Documentation |
528+
|------|---------------|
529+
| Azure PowerShell | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell) |
530+
| Azure CLI | [Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli) |
531+
| Azure REST API | [Add role assignment](../role-based-access-control/role-assignments-rest.md) |
542532

543-
To access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account.
533+
> [!NOTE]
534+
>
535+
> For an Azure key vault, you also have the option to create an access policy for your managed
536+
> identity on your key vault and assign the appropriate permissions for that identity on that
537+
> key vault. The later steps in this section describe how to complete this task by using the
538+
> [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell,
539+
> and Azure CLI, see the following documentation:
540+
541+
> | Tool | Documentation |
542+
> |------|---------------|
543+
> | Azure Resource Manager template (ARM template) | [Key Vault access policy resource definition](/azure/templates/microsoft.keyvault/vaults) |
544+
> | Azure PowerShell | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell) |
545+
> | Azure CLI | [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli) |
544546
545547
<a name="azure-portal-assign-role"></a>
546548

0 commit comments

Comments
 (0)