Skip to content

Commit 0e411c3

Browse files
committed
Fix issues
1 parent 78ab53c commit 0e411c3

1 file changed

Lines changed: 33 additions & 35 deletions

File tree

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 33 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: Authenticate Connections with Managed Identities
3-
description: Secure workflow connections to protected Azure resources without managing credentials, secrets, or tokens by using a managed identity in Azure Logic Apps.
4-
services: logic-apps
3+
description: Secure workflow connections to protected Azure resources by using a managed identity in Azure Logic Apps. Avoid managing credentials, secrets, or tokens.
4+
services: azure-logic-apps
55
ms.suite: integration
66
ms.reviewers: estfan, azla
77
ms.topic: how-to
8-
ms.date: 03/13/2026
8+
ms.date: 03/18/2026
99
ms.date-cycle: 365 days
1010
ms.custom:
1111
- subject-rbac-steps
@@ -18,9 +18,7 @@ ms.custom:
1818

1919
[!INCLUDE [logic-apps-sku-consumption-standard](../../includes/logic-apps-sku-consumption-standard.md)]
2020

21-
To authenticate connections from logic app workflows to Microsoft Entra-protected Azure resources, set up a *managed identity*. This identity accesses protected resources on your logic app's behalf.
22-
23-
As the recommended security option, managed identity authentication removes the need to store and manage credentials, secrets, or access tokens. Azure manages this identity to help keep your authentication details secure.
21+
Set up a *managed identity* when you want to authenticate connections from logic app workflows to Microsoft Entra-protected Azure resources. This identity accesses protected resources on your logic app's behalf and removes the need to store and manage credentials, secrets, or access tokens. Due to this behavior, a managed identity is recommended for authentication. Azure manages this identity to help keep your authentication details secure.
2422

2523
In Azure Logic Apps, many connectors support both managed identity types:
2624

@@ -72,7 +70,7 @@ Before you set up and use a managed identity with a logic app, review the follow
7270

7371
- Your logic app resource has only one unique system-assigned identity.
7472

75-
By default, the system-assigned identity is already enabled on Standard logic apps.
73+
By default, Standard logic apps automatically enable the system-assigned identity.
7674

7775
- Your logic app resource can have the system-assigned identity and one or more user-assigned identities enabled at the same time.
7876

@@ -98,7 +96,7 @@ For more information, see:
9896

9997
For built-in and managed connector operations in Azure Logic Apps to support managed identity authentication, they must support OAuth with Microsoft Entra.
10098

101-
The following tables provide a sample connector selection that supports managed identity authentication, based on the logic app type.
99+
The following tables show sample connectors that support managed identity authentication, based on the logic app type.
102100

103101
### [Consumption](#tab/consumption)
104102

@@ -130,13 +128,13 @@ Based on your logic app type, follow the corresponding steps for the Azure porta
130128

131129
### [Consumption](#tab/consumption)
132130

133-
On a Consumption logic app resource, you must manually enable the system-assigned identity.
131+
On a Consumption logic app resource, manually enable the system-assigned identity.
134132

135133
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app resource.
136134

137135
1. On the logic app sidebar, under **Settings**, select **Identity**.
138136

139-
1. On the **Identity** page, under **System assigned**, select **On** > **Save**. To confirm, select **Yes**.
137+
1. On the **Identity** page, under **System assigned**, select **On**, and then select **Save**. To confirm, select **Yes**.
140138

141139
:::image type="content" source="media/authenticate-with-managed-identity/enable-system-assigned-identity-consumption.png" alt-text="Screenshot that shows the Azure portal, Consumption logic app, Identity page, and System assigned tab with selected options, On and Save." lightbox="media/authenticate-with-managed-identity/enable-system-assigned-identity-consumption.png":::
142140

@@ -158,7 +156,7 @@ On a Standard logic app resource, the system-assigned identity is automatically
158156

159157
1. On the logic app sidebar, under **Settings**, select **Identity**.
160158

161-
1. On the **Identity** page, under **System assigned**, select **On** > **Save**. To confirm, select **Yes**.
159+
1. On the **Identity** page, under **System assigned**, select **On**, and then select **Save**. To confirm, select **Yes**.
162160

163161
:::image type="content" source="media/authenticate-with-managed-identity/enable-system-assigned-identity-standard.png" alt-text="Screenshot that shows the Azure portal, Standard logic app, Identity page, and System assigned tab with selected options for On and Save." lightbox="media/authenticate-with-managed-identity/enable-system-assigned-identity-standard.png":::
164162

@@ -181,7 +179,7 @@ On a Standard logic app resource, the system-assigned identity is automatically
181179

182180
To automate creating and deploying logic app resources, use an [ARM template](logic-apps-azure-resource-manager-templates-overview.md).
183181

184-
In your template, at the root level, your logic app resouce definition requires an `identity` object with the `type` property set to `SystemAssigned`, for example:
182+
In your template, at the root level, your logic app resource definition requires an `identity` object with the `type` property set to `SystemAssigned`, for example:
185183

186184
### [Consumption](#tab/consumption)
187185

@@ -230,7 +228,7 @@ When Azure creates your logic app resource definition, the `identity` object get
230228

231229
| Property (JSON) | Value | Description |
232230
|-----------------|-------|-------------|
233-
| `principalId` | <*principal-ID*> | The Globally Unique Identifier (GUID) that Microsoft Entra uses to admiminister the service principal object for your managed identity in the Microsoft Entra tenant. This GUID sometimes appears as an "object ID" or `objectID`. |
231+
| `principalId` | <*principal-ID*> | The Globally Unique Identifier (GUID) that Microsoft Entra uses to manage the service principal object for your managed identity in the Microsoft Entra tenant. This GUID sometimes appears as an "object ID" or `objectID`. |
234232
| `tenantId` | <*Microsoft-Entra-tenant-ID*> | The Globally Unique Identifier (GUID) that represents the Microsoft Entra tenant where the logic app is now a member. Inside the Microsoft Entra tenant, the service principal has the same name as the logic app instance. |
235233

236234
<a name="azure-portal-user-identity"></a>
@@ -522,7 +520,7 @@ When the template creates your logic app resource definition, the `identity` obj
522520

523521
| Property (JSON) | Value | Description |
524522
|-----------------|-------|-------------|
525-
| `principalId` | <*principal-ID*> | The Globally Unique Identifier (GUID) that Microsoft Entra uses to admiminister the service principal object for your managed identity in the Microsoft Entra tenant. This GUID sometimes appears as an "object ID" or `objectID`. In the Microsoft Entra tenant, the service principal has the same name as the logic app instance. |
523+
| `principalId` | <*principal-ID*> | The Globally Unique Identifier (GUID) that Microsoft Entra uses to administrate the service principal object for your managed identity in the Microsoft Entra tenant. This GUID sometimes appears as an "object ID" or `objectID`. In the Microsoft Entra tenant, the service principal has the same name as the logic app instance. |
526524
| `clientId` | <*client-ID*> | The Globally Unique Identifier (GUID) that represents the logic app's identity and specifies the identity to use during runtime calls. |
527525

528526
For more information about Azure Resource Manager templates and managed identities for Azure Functions, see [ARM template - Azure Functions](../azure-functions/functions-create-first-function-resource-manager.md#review-the-template).
@@ -555,7 +553,7 @@ Before you can use the managed identity for authentication, you need to grant th
555553

556554
For example, you can create an access policy on the key vault resource to assign the necessary permissions for your managed identity.
557555

558-
This section show how to create an access policy by using the [Azure portal](#azure-portal-access-policy).
556+
This section shows how to create an access policy by using the [Azure portal](#azure-portal-access-policy).
559557

560558
For Resource Manager templates, Azure PowerShell, and Azure CLI, see:
561559

@@ -623,7 +621,7 @@ For Azure resources that require you to assign a role for your managed identity,
623621
- [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal)
624622
- [Assign a managed identity access to an Azure resource or another resource](/entra/identity/managed-identities-azure-resources/how-to-assign-access-azure-resource)
625623

626-
1. [Authenticate your trigger or action with the managed identity](#authenticate-access-with-identity).
624+
1. [Authenticate your trigger or action by using the managed identity](#authenticate-access-with-identity).
627625

628626
<a name="azure-portal-access-policy"></a>
629627

@@ -659,11 +657,11 @@ For Azure resources where you want to create an access policy for your managed i
659657

660658
1. Skip the optional **Application** step, select **Next**, and finish creating the access policy.
661659

662-
1. [Authenticate your trigger or action with the managed identity](#authenticate-access-with-identity).
660+
1. [Authenticate your trigger or action by using the managed identity](#authenticate-access-with-identity).
663661

664662
<a name="authenticate-access-with-identity"></a>
665663

666-
## Authenticate access with the managed identity
664+
## Authenticate access by using the managed identity
667665

668666
This section shows how to use a managed identity to authenticate access for a workflow [trigger or action that supports managed identity authentication](#triggers-actions-managed-identity). The example continues from where you set up access for a managed identity by using RBAC and an Azure storage account. Though your target Azure resource might differ, the general steps are mostly similar.
669667

@@ -678,13 +676,13 @@ The following steps show how to use the managed identity by using the Azure port
678676

679677
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app resource.
680678

681-
1. Add the [trigger or action that supports managed identities](#triggers-actions-managed-identity), if you haven't taken this step already.
679+
1. Add the [trigger or action that supports managed identities](#triggers-actions-managed-identity), if you haven't already.
682680

683681
1. On the trigger or action, follow these steps:
684682

685683
- **Built-in operations**
686684

687-
These steps continue by using the **HTTP** action as an example.
685+
These steps use the **HTTP** action as an example.
688686

689687
1. From the **Advanced parameters** list, select the **Authentication** parameter.
690688

@@ -727,15 +725,15 @@ The following steps show how to use the managed identity by using the Azure port
727725

728726
- **Single-authentication**: These connectors support only one authentication type, which is the managed identity in this case.
729727

730-
The following steps continue by using an **Azure Resource** action as an example:
728+
The following steps use an **Azure Resource** action as an example:
731729

732730
1. From the **Managed Identity** list, select the currently enabled managed identity.
733731

734732
1. Select **Create new**.
735733

736734
- **Multi-authentication**: These connectors support multiple authentication types, but you can select and use only one type at a time.
737735

738-
The following steps continue by using an **Azure Blob Storage** action as an example:
736+
The following steps use an **Azure Blob Storage** action as an example:
739737

740738
1. From the **Authentication Type** list, select **Logic Apps Managed Identity**.
741739

@@ -749,13 +747,13 @@ The following steps show how to use the managed identity by using the Azure port
749747

750748
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
751749

752-
1. Add the [trigger or action that supports managed identities](#triggers-actions-managed-identity), if you haven't taken this step already.
750+
1. Add the [trigger or action that supports managed identities](#triggers-actions-managed-identity), if you haven't already.
753751

754752
1. On the trigger or action, follow these steps:
755753

756754
- **Built-in operations**
757755

758-
These steps continue by using the **HTTP** action as an example.
756+
These steps use the **HTTP** action as an example.
759757

760758
1. From the **Advanced parameters** list, select the **Authentication** parameter.
761759

@@ -810,7 +808,7 @@ The following steps show how to use the managed identity by using the Azure port
810808

811809
- **Multi-authentication**: These connectors support multiple authentication types, but you can select and use only one type at a time.
812810

813-
The following steps continue by using an **Azure Blob Storage** action as an example.
811+
The following steps use an **Azure Blob Storage** action as an example.
814812

815813
1. From the **Authentication Type** list, select **Logic Apps Managed Identity**.
816814

@@ -861,7 +859,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
861859

862860
The following example shows a sample **HTTP** action with all the previously described property values to use for the Snapshot Blob operation:
863861

864-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
862+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
865863

866864
1. In the **HTTP** action, from the **Advanced parameters** list, select **Authentication**.
867865

@@ -914,7 +912,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
914912

915913
The following example shows a sample **HTTP** action with all the previously described property values to use for the Snapshot Blob operation:
916914

917-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
915+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
918916

919917
1. In the **HTTP** action, from the **Advanced parameters** list, select **Authentication**.
920918

@@ -965,7 +963,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
965963

966964
<a name="authenticate-managed-connector-managed-identity"></a>
967965

968-
## Example: Authenticate managed connector trigger or action with a managed identity
966+
## Example: Authenticate managed connector trigger or action by using a managed identity
969967

970968
The **Azure Resource Manager** managed connector has an action named **Read a resource** that can use the managed identity you enable on your logic app resource. This example shows how to use the system-assigned managed identity with a managed connector.
971969

@@ -1033,7 +1031,7 @@ The **Azure Resource Manager** managed connector has an action named **Read a re
10331031

10341032
## Connections with managed identities in logic app resource definitions
10351033

1036-
A managed identity authenticated connection type is a special connection type that works only with a managed identity. At workflow runtime, the connection uses the managed identity enabled on the logic app resource. Azure Logic Apps checks whether any managed connector operations in the workflow use the managed identity and whether all the required permissions exist to use the managed identity for accessing the corresponding target resources. If this check passess successfully, Azure Logic Apps gets the Microsoft Entra token associated with the managed identity, uses that identity to authenticate access to the target Azure resources, and performs the corresponding operations in the workflow.
1034+
A managed identity authenticated connection type is a special connection type that works only with a managed identity. At workflow runtime, the connection uses the managed identity enabled on the logic app resource. Azure Logic Apps checks whether any managed connector operations in the workflow use the managed identity and whether all the required permissions exist to use the managed identity for accessing the corresponding target resources. If this check passes successfully, Azure Logic Apps gets the Microsoft Entra token associated with the managed identity, uses that identity to authenticate access to the target Azure resources, and performs the corresponding operations in the workflow.
10371035

10381036
### [Consumption](#tab/consumption)
10391037

@@ -1147,13 +1145,13 @@ This example shows the `managedApiConnections` object configuration when the log
11471145

11481146
## ARM template for API connections and managed identities
11491147

1150-
If you use an ARM template to automate deployment, and your workflow includes an API connection, which is created by a [managed connector](../connectors/managed.md), that uses a managed identity, you need to take an extra step.
1148+
If you use an ARM template to automate deployment, and your workflow includes an API connection created by a [managed connector](../connectors/managed.md) and uses a managed identity, you need to take an extra step.
11511149

1152-
In an ARM template, the underlying connector resource definition differs based on whether you have a Consumption or Standard logic app resource and whether the [connector shows single-authentication or multi-authentication options](#managed-connectors-managed-identity).
1150+
In an ARM template, the underlying connector resource definition differs based on whether you use a Consumption or Standard logic app resource and whether the [connector shows single-authentication or multi-authentication options](#managed-connectors-managed-identity).
11531151

11541152
### [Consumption](#tab/consumption)
11551153

1156-
The following examples apply to Consumption logic app resources. They show how the underlying connector resource definition differs between a single-authentication connector and a multi-authentication connector.
1154+
The following examples apply to Consumption logic app resources. They show how the underlying connector resource definition differs between a single-authentication connector and a multiauthentication connector.
11571155

11581156
#### Single-authentication
11591157

@@ -1185,7 +1183,7 @@ This example shows the underlying connection resource definition for a connector
11851183
},
11861184
```
11871185

1188-
#### Multi-authentication
1186+
#### Multiple authentication methods
11891187

11901188
This example shows the underlying connection resource definition for a connector action that supports multiple authentication types and uses a managed identity in a Consumption logic app workflow. The definition includes the following attributes:
11911189

@@ -1251,7 +1249,7 @@ This example shows the underlying connection resource definition for a connector
12511249
},
12521250
```
12531251

1254-
#### Multi-authentication
1252+
#### Multiple authentication methods
12551253

12561254
This example shows the underlying connection resource definition for a connector action that supports multiple authentication types and uses a managed identity in a Standard logic app workflow. The definition includes the following attributes:
12571255

@@ -1461,7 +1459,7 @@ When you turn off the managed identity on your logic app resource, you remove th
14611459
>
14621460
> Avoid disabling the system-assigned identity as much as possible. To remove the identity's access to Azure resources, remove the identity's role assignment from the target resource. If you delete your logic app resource, Azure automatically removes the managed identity from Microsoft Entra ID.
14631461
1464-
The following sections show how to disable the managed identiy by using the [Azure portal](#azure-portal-disable) and [Azure Resource Manager template (ARM template)](#template-disable). For Azure PowerShell, Azure CLI, and Azure REST API, see:
1462+
The following sections show how to disable the managed identity by using the [Azure portal](#azure-portal-disable) and [Azure Resource Manager template (ARM template)](#template-disable). For Azure PowerShell, Azure CLI, and Azure REST API, see:
14651463

14661464
| Tool | Documentation |
14671465
|------|---------------|

0 commit comments

Comments
 (0)