You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/lifecycle-workflow-extensibility.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,24 +21,32 @@ Lifecycle Workflows allow you to create workflows that can be triggered based on
21
21
22
22
## Prerequisite Logic App roles required for integration with the custom task extension
23
23
24
-
When linking your Azure Logic App with the custom task extension task, there are certain permissions that must be completed before the link can be established.
24
+
When you link your Azure Logic App with the custom task extension task, there are certain prerequisites that must be completed before the link can be established.
25
25
26
-
The roles on the Azure Logic App, which allows it to be compatible with the custom task extension, are as follows:
26
+
To create a Logic App, you must have:
27
+
28
+
- A valid Azure subscription
29
+
- A compatible resource group where the Logic App is located
30
+
31
+
> [!NOTE]
32
+
> The resource group needs permissions to create, update, and read the Logic App while the custom extension is being created.
33
+
34
+
The roles on the Azure Logic App required with the custom task extension, are as follows:
27
35
28
36
-**Logic App contributor**
29
37
-**Contributor**
30
38
-**Owner**
31
39
32
40
> [!NOTE]
33
-
> The **Logic App Operator** role alone will not make an Azure Logic App compatible with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
41
+
> The **Logic App Operator** role alone will not work with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
34
42
35
43
## Custom task extension deployment scenarios
36
44
37
45
When creating custom task extensions, the scenarios for how it interacts with Lifecycle Workflows can be one of two ways:
38
46
39
47
:::image type="content" source="media/lifecycle-workflow-extensibility/task-extension-deployment-scenarios.png" alt-text="Screenshot of custom task deployment scenarios.":::
40
48
41
-
-**Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. With this scenario, as long as the workflow is started successfully, the workflow is viewed as a success.
49
+
-**Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. If the Logic App is started successfully, the Lifecycle Workflow task is considered a success.
42
50
-**Launch and wait** - The Azure Logic App is started, and the following task's execution waits on the response from the Logic App. You enter a time duration for how long the custom task extension should wait for a response from the Azure Logic App. If no response is received within a customer defined duration window, the task is considered failed.
43
51
:::image type="content" source="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png" alt-text="Screenshot of custom task launch and wait task choice." lightbox="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png":::
44
52
@@ -50,9 +58,9 @@ When creating a custom task extension that waits for a response from the Logic A
50
58
51
59
Response authorization can be utilized in one of the following ways:
52
60
53
-
-**System-assigned managed identity (Default)** - Enables and utilizes the Logic Apps system-assigned managed identity. For more information on this, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
54
-
-**No authorization** - Grants no authorization to the Logic App. You're responsible for assigning an application permission, or role assignment.
55
-
-**Existing application** - You can choose an existing application to respond.
61
+
-**System-assigned managed identity (Default)** - With this choice you Enable and utilize the Logic Apps system-assigned managed identity. For more information on this, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
62
+
-**No authorization** - With this choice you assign a Logic App or third party application an application permission (LifecycleWorkflows.ReadWrite.All), or role assignment (Lifecycle Workflows Administrator). This isn't recommended as it doesn't follow least privilege access. For more information on best practices for roles, see: [Best Practices for Azure AD roles](/azure/active-directory/roles/best-practices).
63
+
-**Existing application** - With this choice you're able to choose an existing application to respond.
0 commit comments