You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Authenticate with managed identities - Azure Logic Apps | Microsoft Docs
2
+
title: Authenticate with managed identities - Azure Logic Apps
3
3
description: To authenticate without signing in, you can create a managed identity (formerly called Managed Service Identity or MSI) so your logic app can access resources in other Azure Active Directory (Azure AD) tenants without credentials or secrets
4
-
author: kevinlam1
5
-
ms.author: klam
6
-
ms.reviewer: estfan, LADocs
4
+
author: ecfan
5
+
ms.author: estfan
6
+
ms.reviewer: klam, LADocs
7
7
services: logic-apps
8
8
ms.service: logic-apps
9
9
ms.suite: integration
@@ -13,39 +13,26 @@ ms.date: 03/29/2019
13
13
14
14
# Authenticate and access resources with managed identities in Azure Logic Apps
15
15
16
-
To access resources in other Azure Active Directory (Azure AD) tenants and
17
-
authenticate your identity without signing in, your logic app can use a
(formerly known as Managed Service Identity or MSI), rather than credentials or secrets.
20
-
Azure manages this identity for you and helps secure your credentials because you don't
21
-
have to provide or rotate secrets. This article shows how you can set up and use a
22
-
system-assigned managed identity for your logic app. For more information about managed identities,
23
-
see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
16
+
To access resources in other Azure Active Directory (Azure AD) tenants and authenticate your identity without signing in, your logic app can use a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) (formerly known as Managed Service Identity or MSI), rather than credentials or secrets. Azure manages this identity for you and helps secure your credentials because you don't have to provide or rotate secrets. This article shows how you can set up and use a system-assigned managed identity for your logic app. For more information about managed identities, see [What is managed identities for Azure resources?](../active-directory/managed-identities-azure-resources/overview.md)
24
17
25
18
> [!NOTE]
26
-
> Your logic app can use managed identities only with
27
-
> connectors that support managed identities. Currently,
19
+
> Your logic app can use managed identities only with connectors that support managed identities. Currently,
28
20
> only the HTTP connector supports managed identities.
29
21
>
30
-
> You can currently have up to 10 logic app workflows with
31
-
> system-assigned managed identities in each Azure subscription.
22
+
> You can currently have up to 10 logic app workflows with system-assigned managed identities in each Azure subscription.
32
23
33
24
## Prerequisites
34
25
35
-
* An Azure subscription, or if you don't have a subscription,
36
-
<ahref="https://azure.microsoft.com/free/"target="_blank">sign up for a free Azure account</a>.
26
+
* An Azure subscription, or if you don't have a subscription, [sign up for a free Azure account](https://azure.microsoft.com/free/).
37
27
38
-
* The logic app where you want to use the system-assigned
39
-
managed identity. If you don't have a logic app, see
28
+
* The logic app where you want to use the system-assigned managed identity. If you don't have a logic app, see
40
29
[Create your first logic app workflow](../logic-apps/quickstart-create-first-logic-app-workflow.md).
41
30
42
31
<aname="enable-identity"></a>
43
32
44
33
## Enable managed identity
45
34
46
-
For system-assigned managed identities, you don't have to manually create that identity.
47
-
To set up a system-assigned managed identity for your logic app,
48
-
you can use these ways:
35
+
For system-assigned managed identities, you don't have to manually create that identity. To set up a system-assigned managed identity for your logic app, you can use these ways:
49
36
50
37
*[Azure portal](#azure-portal)
51
38
*[Azure Resource Manager templates](#template)
@@ -55,41 +42,30 @@ you can use these ways:
55
42
56
43
### Azure portal
57
44
58
-
To enable a system-assigned managed identity for your logic app through
59
-
the Azure portal, turn on the **System assigned** setting in your logic
60
-
app's identity settings.
45
+
To enable a system-assigned managed identity for your logic app through the Azure portal, turn on the **System assigned** setting in your logic app's identity settings.
61
46
62
-
1. In the [Azure portal](https://portal.azure.com),
63
-
open your logic app in Logic App Designer.
47
+
1. In the [Azure portal](https://portal.azure.com), open your logic app in Logic App Designer.
64
48
65
-
1. On the logic app menu, under **Settings**, select **Identity**.
49
+
1. On the logic app menu, under **Settings**, select **Identity**.
66
50
67
-
1. Under **System assigned** > **Status**, choose **On**.

71
54
72
-
Your logic app now has a system-assigned managed identity registered
73
-
in Azure Active Directory:
55
+
Your logic app now has a system-assigned managed identity registered in Azure Active Directory:
74
56
75
57

76
58
77
-
| Property | Value | Description |
78
-
|----------|-------|-------------|
79
-
|**Object ID**| <*identity-resource-ID*> | A Globally Unique Identifier (GUID) that represents the system-assigned managed identity for your logic app in an Azure AD tenant |
80
-
|||
59
+
| Property | Value | Description |
60
+
|----------|-------|-------------|
61
+
|**Object ID**| <*identity-resource-ID*> | A Globally Unique Identifier (GUID) that represents the system-assigned managed identity for your logic app in an Azure AD tenant |
your logic app through a template, add the `"identity"`
91
-
element and `"type"` property to your logic app workflow
92
-
definition in your deployment template:
68
+
When you want to automate creating and deploying Azure resources such as logic apps, you can use [Azure Resource Manager templates](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md). To create a system-assigned managed identity for your logic app through a template, add the `"identity"` element and `"type"` property to your logic app workflow definition in your deployment template:
93
69
94
70
```json
95
71
"identity": {
@@ -122,8 +98,7 @@ For example:
122
98
}
123
99
```
124
100
125
-
When Azure creates your logic app, that logic app's
126
-
workflow definition includes these additional properties:
101
+
When Azure creates your logic app, that logic app's workflow definition includes these additional properties:
127
102
128
103
```json
129
104
"identity": {
@@ -133,78 +108,57 @@ workflow definition includes these additional properties:
133
108
}
134
109
```
135
110
136
-
| Property | Value | Description |
111
+
| Property | Value | Description |
137
112
|----------|-------|-------------|
138
-
| **principalId** | <*principal-ID*> | A Globally Unique Identifier (GUID) that represents the logic app in the Azure AD tenant and sometimes appears as an "object ID" or `objectID` |
139
-
| **tenantId** | <*Azure-AD-tenant-ID*> | A Globally Unique Identifier (GUID) that represents the Azure AD tenant where the logic app is now a member. Inside the Azure AD tenant, the service principal has the same name as the logic app instance. |
140
-
|||
113
+
| **principalId** | <*principal-ID*> | A Globally Unique Identifier (GUID) that represents the logic app in the Azure AD tenant and sometimes appears as an "object ID" or `objectID` |
114
+
| **tenantId** | <*Azure-AD-tenant-ID*> | A Globally Unique Identifier (GUID) that represents the Azure AD tenant where the logic app is now a member. Inside the Azure AD tenant, the service principal has the same name as the logic app instance. |
115
+
||||
141
116
142
117
<a name="access-other-resources"></a>
143
118
144
119
## Access resources with managed identity
145
120
146
-
After you create a system-assigned managed identity for your logic app,
147
-
you can [give that identity access to other Azure resources](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md).
148
-
You can then use that identity for authentication, just like any other
After you create a system-assigned managed identity for your logic app, you can [give that identity access to other Azure resources](../active-directory/managed-identities-azure-resources/howto-assign-access-portal.md). You can then use that identity for authentication, just like any other [service principal](../active-directory/develop/app-objects-and-service-principals.md).
150
122
151
123
> [!NOTE]
152
124
> Both the system-assigned managed identity and the resource where
153
125
> you want to assign access must have the same Azure subscription.
154
126
155
127
### Assign access to managed identity
156
128
157
-
To give access to another Azure resource for your logic
158
-
app's system-assigned managed identity, follow these steps:
129
+
To give access to another Azure resource for your logic app's system-assigned managed identity, follow these steps:
159
130
160
-
1. In the Azure portal, go to the Azure resource where
161
-
you want to assign access for your managed identity.
131
+
1. In the Azure portal, go to the Azure resource where you want to assign access for your managed identity.
162
132
163
-
1. From the resource's menu, select **Access control (IAM)**.
164
-
On the toolbar, choose **Add** > **Add role assignment**.
133
+
1. From the resource's menu, select **Access control (IAM)**. On the toolbar, choose **Add** > **Add role assignment**.
165
134
166
135

167
136
168
-
1. Under **Add role assignment**, select the **Role** you want for the identity.
137
+
1. Under **Add role assignment**, select the **Role** you want for the identity.
169
138
170
-
1. In the **Assign access to** property,
171
-
select **Azure AD user, group, or service principal**,
172
-
if not already selected.
139
+
1. In the **Assign access to** property, select **Azure AD user, group, or service principal**, if not already selected.
173
140
174
-
1. In the **Select** box, starting with the first character
175
-
in your logic app's name, enter your logic app's name.
176
-
When your logic app appears, select the logic app.
141
+
1. In the **Select** box, starting with the first character in your logic app's name, enter your logic app's name. When your logic app appears, select the logic app.
177
142
178
143

179
144
180
145
1. When you're done, choose **Save**.
181
146
182
147
### Authenticate with managed identity in logic app
183
148
184
-
After you set up your logic app with a system-assigned managed identity
185
-
and assigned access to the resource you want for that identity,
186
-
you can now use that identity for authentication. For example,
187
-
you can use an HTTP action so your logic app can send an HTTP
188
-
request or call to that resource.
149
+
After you set up your logic app with a system-assigned managed identity and assigned access to the resource you want for that identity, you can now use that identity for authentication. For example, you can use an HTTP action so your logic app can send an HTTP request or call to that resource.
189
150
190
151
1. In your logic app, add the **HTTP** action.
191
152
192
-
1. Provide the necessary details for that action,
193
-
such as the request **Method** and **URI** location
194
-
for the resource you want to call.
153
+
1. Provide the necessary details for that action, such as the request **Method** and **URI** location for the resource you want to call.
195
154
196
-
For example, suppose you're using Azure Active
197
-
Directory (Azure AD) authentication with
198
-
[one of these Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication).
199
-
In the **URI** box, enter the endpoint URL for that Azure service.
200
-
So, if you're using Azure Resource Manager, enter this value in the **URI** property:
155
+
For example, suppose you're using Azure Active Directory (Azure AD) authentication with [one of these Azure services that support Azure AD](../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-azure-ad-authentication). In the **URI** box, enter the endpoint URL for that Azure service. So, if you're using Azure Resource Manager, enter this value in the **URI** property:
@@ -224,46 +178,32 @@ appears with the default resource ID value:
224
178
225
179
## Remove managed identity
226
180
227
-
To disable a system-assigned managed identity on your logic app,
228
-
you can follow the steps similar to how you set up the identity
229
-
through the Azure portal, Azure Resource Manager deployment templates,
230
-
or Azure PowerShell.
181
+
To disable a system-assigned managed identity on your logic app, you can follow the steps similar to how you set up the identity through the Azure portal, Azure Resource Manager deployment templates, or Azure PowerShell.
231
182
232
-
When you delete your logic app,
233
-
Azure automatically removes your logic app's
234
-
system-assigned identity from Azure AD.
183
+
When you delete your logic app, Azure automatically removes your logic app's system-assigned identity from Azure AD.
235
184
236
185
### Azure portal
237
186
238
-
To remove a system-assigned managed identity for your logic app
239
-
through the Azure portal, turn off the **System assigned** setting
240
-
in your logic app's identity settings.
187
+
To remove a system-assigned managed identity for your logic app through the Azure portal, turn off the **System assigned** setting in your logic app's identity settings.
241
188
242
-
1. In the [Azure portal](https://portal.azure.com),
243
-
open your logic app in Logic App Designer.
189
+
1. In the [Azure portal](https://portal.azure.com), open your logic app in Logic App Designer.
244
190
245
-
1. On the logic app menu, under **Settings**, select **Identity**.
191
+
1. On the logic app menu, under **Settings**, select **Identity**.
246
192
247
-
1. Under **System assigned** > **Status**, choose **Off**.

251
196
252
197
### Deployment template
253
198
254
-
If you created the logic app's system-assigned managed identity
255
-
with an Azure Resource Manager deployment template, set the
256
-
`"identity"` element's `"type"` property to `"None"`.
257
-
This action also deletes the principal ID from Azure AD.
199
+
If you created the logic app's system-assigned managed identity with an Azure Resource Manager deployment template, set the `"identity"` element's `"type"` property to `"None"`. This action also deletes the principal ID from Azure AD.
258
200
259
201
```json
260
202
"identity": {
261
203
"type": "None"
262
204
}
263
205
```
264
206
265
-
## Get support
207
+
## Next steps
266
208
267
-
* For questions, visit the [Azure Logic Apps forum](https://social.msdn.microsoft.com/Forums/en-US/home?forum=azurelogicapps).
268
-
* To submit or vote on feature ideas, visit the
269
-
[Logic Apps user feedback site](https://aka.ms/logicapps-wish).
209
+
* [Secure access and data in Azure Logic Apps](../logic-apps/logic-apps-securing-a-logic-app.md)
0 commit comments