You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/authenticate-with-managed-identity.md
+25-23Lines changed: 25 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,11 +35,11 @@ This guide shows how to complete the following tasks:
35
35
36
36
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication. For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
| Azure REST API |[Create user-assigned identity](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-rest)|
43
43
44
44
## Prerequisites
45
45
@@ -520,27 +520,29 @@ Before you can use your logic app's managed identity for authentication, you hav
520
520
> suppose you have a managed identity for a logic app that needs access to update the application
521
521
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
522
522
523
-
For example, to access an Azure key vault with your managed identity, you have multiple options:
523
+
For example, to access an Azure Blob storage account or an Azure key vault with your managed identity, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
524
524
525
-
- Set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the key vault.
526
-
527
-
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
528
-
529
-
| Tool | Documentation |
530
-
|------|---------------|
531
-
| Azure PowerShell |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell)|
532
-
| Azure CLI |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli)|
533
-
| Azure REST API |[Add role assignment](../role-based-access-control/role-assignments-rest.md)|
525
+
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
534
526
535
-
- Create an access policy for that identity on your key vault and assign the appropriate permissions for that identity on that key vault. The later steps in this section describe how to complete this task by using the [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell, and Azure CLI, see the following documentation:
| Azure PowerShell |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-powershell)|
541
-
| Azure CLI |[Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-cli)|
527
+
| Tool | Documentation |
528
+
|------|---------------|
529
+
| Azure PowerShell |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-powershell)|
530
+
| Azure CLI |[Add role assignment](/entra/identity/managed-identities-azure-resources/how-to-assign-app-role-managed-identity-cli)|
531
+
| Azure REST API |[Add role assignment](../role-based-access-control/role-assignments-rest.md)|
542
532
543
-
To access an Azure Blob storage account with your managed identity, you have to set up access by using Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account.
533
+
> [!NOTE]
534
+
>
535
+
> For an Azure key vault, you also have the option to create an access policy for your managed
536
+
> identity on your key vault and assign the appropriate permissions for that identity on that
537
+
> key vault. The later steps in this section describe how to complete this task by using the
538
+
> [Azure portal](#azure-portal-access-policy). For Resource Manager templates, PowerShell,
0 commit comments