Skip to content

Commit cdbb9fe

Browse files
committed
updates
1 parent 6b4a501 commit cdbb9fe

File tree

3 files changed

+15
-7
lines changed

3 files changed

+15
-7
lines changed

articles/active-directory/governance/lifecycle-workflow-extensibility.md

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -21,24 +21,32 @@ Lifecycle Workflows allow you to create workflows that can be triggered based on
2121

2222
## Prerequisite Logic App roles required for integration with the custom task extension
2323

24-
When linking your Azure Logic App with the custom task extension task, there are certain permissions that must be completed before the link can be established.
24+
When you link your Azure Logic App with the custom task extension task, there are certain prerequisites that must be completed before the link can be established.
2525

26-
The roles on the Azure Logic App, which allows it to be compatible with the custom task extension, are as follows:
26+
To create a Logic App, you must have:
27+
28+
- A valid Azure subscription
29+
- A compatible resource group where the Logic App is located
30+
31+
> [!NOTE]
32+
> The resource group needs permissions to create, update, and read the Logic App while the custom extension is being created.
33+
34+
The roles on the Azure Logic App required with the custom task extension, are as follows:
2735

2836
- **Logic App contributor**
2937
- **Contributor**
3038
- **Owner**
3139

3240
> [!NOTE]
33-
> The **Logic App Operator** role alone will not make an Azure Logic App compatible with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
41+
> The **Logic App Operator** role alone will not work with the custom task extension. For more information on the required **Logic App contributor** role, see: [Logic App Contributor](../../role-based-access-control/built-in-roles.md#logic-app-contributor).
3442
3543
## Custom task extension deployment scenarios
3644

3745
When creating custom task extensions, the scenarios for how it interacts with Lifecycle Workflows can be one of two ways:
3846

3947
:::image type="content" source="media/lifecycle-workflow-extensibility/task-extension-deployment-scenarios.png" alt-text="Screenshot of custom task deployment scenarios.":::
4048

41-
- **Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. With this scenario, as long as the workflow is started successfully, the workflow is viewed as a success.
49+
- **Launch and continue** - The Azure Logic App is started, and the following task execution immediately continues with no response expected from the Azure Logic App. This scenario is best suited if the Lifecycle workflow doesn't require any feedback (including status) from the Azure Logic App. If the Logic App is started successfully, the Lifecycle Workflow task is considered a success.
4250
- **Launch and wait** - The Azure Logic App is started, and the following task's execution waits on the response from the Logic App. You enter a time duration for how long the custom task extension should wait for a response from the Azure Logic App. If no response is received within a customer defined duration window, the task is considered failed.
4351
:::image type="content" source="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png" alt-text="Screenshot of custom task launch and wait task choice." lightbox="media/lifecycle-workflow-extensibility/custom-task-launch-wait.png":::
4452

@@ -50,9 +58,9 @@ When creating a custom task extension that waits for a response from the Logic A
5058

5159
Response authorization can be utilized in one of the following ways:
5260

53-
- **System-assigned managed identity (Default)** - Enables and utilizes the Logic Apps system-assigned managed identity. For more information on this, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
54-
- **No authorization** - Grants no authorization to the Logic App. You're responsible for assigning an application permission, or role assignment.
55-
- **Existing application** - You can choose an existing application to respond.
61+
- **System-assigned managed identity (Default)** - With this choice you Enable and utilize the Logic Apps system-assigned managed identity. For more information on this, see: [Authenticate access to Azure resources with managed identities in Azure Logic Apps](/azure/logic-apps/create-managed-service-identity)
62+
- **No authorization** - With this choice you assign a Logic App or third party application an application permission (LifecycleWorkflows.ReadWrite.All), or role assignment (Lifecycle Workflows Administrator). This isn't recommended as it doesn't follow least privilege access. For more information on best practices for roles, see: [Best Practices for Azure AD roles](/azure/active-directory/roles/best-practices).
63+
- **Existing application** - With this choice you're able to choose an existing application to respond.
5664

5765

5866

-63.3 KB
Loading
201 Bytes
Loading

0 commit comments

Comments
 (0)