You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/configure-logic-app-lifecycle-workflows.md
+55-4Lines changed: 55 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: owinfreyATL
5
5
ms.author: owinfrey
6
6
ms.service: active-directory
7
7
ms.topic: reference
8
-
ms.date: 01/26/2023
8
+
ms.date: 03/17/2023
9
9
ms.custom: template-how-to
10
10
---
11
11
@@ -15,6 +15,19 @@ ms.custom: template-how-to
15
15
16
16
Before you can use an existing Azure Logic App with the custom task extension feature of Lifecycle Workflows, it must first be made compatible. This reference guide provides a list of steps that must be taken to make the Azure Logic App compatible. For a guide on creating a new compatible Logic App via the Lifecycle Workflows portal, see [Trigger Logic Apps based on custom task extensions (preview)](trigger-custom-task.md).
17
17
18
+
## Determine type of token security of your custom task extension
19
+
20
+
Before configuring your Azure Logic App custom extension for use with Lifecycle Workflows, you must first figure out what type of token security it has. The two token security types can either be:
21
+
22
+
- Normal
23
+
- Proof of Possession(POP)
24
+
25
+
26
+
To determine the security token type of your custom task extension, you'd check the **Custom extensions (Preview)** page:
27
+
28
+
:::image type="content" source="media/configure-logic-app-lifecycle-workflows/custom-task-extension-token-type.png" alt-text="Screenshot of custom task extension and token type.":::
29
+
30
+
18
31
## Configure existing Logic Apps for LCW use
19
32
20
33
Making an Azure Logic app compatible to run with the **Custom Task Extension** requires the following steps:
@@ -24,7 +37,7 @@ Making an Azure Logic app compatible to run with the **Custom Task Extension** r
24
37
- Enable system assigned managed identity.
25
38
- Configure AuthZ policies.
26
39
27
-
To configure those you'll follow these steps:
40
+
To configure those you follow these steps:
28
41
29
42
1. Open the Azure Logic App you want to use with Lifecycle Workflow. Logic Apps may greet you with an introduction screen, which you can close with the X in the upper right corner.
30
43
@@ -202,11 +215,16 @@ To configure those you'll follow these steps:
202
215
203
216
1. Select Save.
204
217
205
-
1. For Logic Apps authorization policy, we'll need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure portal** to find the required Application ID.
218
+
219
+
## Configure authorization policy for custom task extension with normal security token type
220
+
221
+
If the security token type is **Normal** for your custom task extension, you'd set the authorization policy by following these steps:
222
+
223
+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
206
224
207
225
1. Go back to the logic app you created, and select **Authorization**.
208
226
209
-
1. Create two authorization policies based on the tables below:
227
+
1. Create two authorization policies based on these tables:
210
228
211
229
Policy name: AzureADLifecycleWorkflowsAuthPolicy
212
230
@@ -228,6 +246,39 @@ To configure those you'll follow these steps:
228
246
> [!NOTE]
229
247
> Due to a current bug in the Logic Apps UI you may have to save the authorization policy after each claim before adding another.
230
248
249
+
## Configure authorization policy for custom task extension with POP security token type
250
+
If the security token type is **Proof of Possession (POP)** for your custom task extension, you'd set the authorization policy by following these steps:
251
+
252
+
1. For Logic Apps authorization policy, we need the managed identities **Application ID**. Since the Azure portal only shows the Object ID, we need to look up the Application ID. You can search for the managed identity by Object ID under **Enterprise Applications in the Azure AD Portal** to find the required Application ID.
253
+
254
+
1. Go back to the logic app you created, and select **Authorization**.
255
+
256
+
1. Create two authorization policies based on these tables:
257
+
258
+
Policy name: POP-Policy
259
+
260
+
|Claim |Value |
261
+
|---------|---------|
262
+
|Issuer | https://sts.windows.net/(Tenant ID)/ |
263
+
|Audience | Application ID of your Logic Apps Managed Identity |
0 commit comments