You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Azure REST API | - [System-assigned](/rest/api/managedidentity/system-assigned-identities) <br>- [User-assigned](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-rest)|
42
42
43
43
For more information, see:
44
44
@@ -262,6 +262,8 @@ You need to create the identity as a separate Azure resource before you can enab
262
262
263
263
After Azure validates the information, Azure creates your managed identity. Now you can add the user-assigned identity to your logic app resource.
264
264
265
+
<aid="add-user-identity-portal"></a>
266
+
265
267
## Add user-assigned identity to logic app (portal)
266
268
267
269
After you create the user-assigned identity, add the identity to your Consumption or Standard logic app resource.
@@ -765,7 +767,7 @@ The following steps show how to use the managed identity by using the Azure port
765
767
766
768
1. From the **Authentication type** list, select **Managed identity**.
767
769
768
-
:::image type="content" source="media/authenticate-with-managed-identity/built-in-managed-identity.png" alt-text="Screenshot shows Standard workflow, example built-in action, opened Authentication type list, and selected option for Managed identity." lightbox="media/authenticate-with-managed-identity/built-in-managed-identity-standard.png":::
770
+
:::image type="content" source="media/authenticate-with-managed-identity/built-in-managed-identity.png" alt-text="Screenshot shows Standard workflow, example built-in action, opened Authentication type list, and selected option for Managed identity." lightbox="media/authenticate-with-managed-identity/built-in-managed-identity.png":::
769
771
770
772
The **Authentication** section now shows the following options:
771
773
@@ -784,7 +786,7 @@ The following steps show how to use the managed identity by using the Azure port
784
786
>
785
787
> By default, **System-assigned managed identity** is the selected option, even when you don't enable any managed identities. By default, Standard logic apps automatically enable the system identity. Although these logic apps can have multiple identities enabled, they can use only one identity at a time.
786
788
>
787
-
> For example, a workflow that accesses different Azure Service Bus messaging entities should use only one managed identity. See[Connect to Azure Service Bus from workflows](../connectors/connectors-create-api-servicebus.md#prerequisites).
789
+
> For example, a workflow that accesses different Azure Service Bus messaging entities should use only one managed identity. For more information, see[Connect to Azure Service Bus from workflows](../connectors/connectors-create-api-servicebus.md#prerequisites).
788
790
789
791
For more information, see [Example: Authenticate built-in trigger or action with a managed identity](#authenticate-built-in-managed-identity).
Copy file name to clipboardExpand all lines: articles/logic-apps/create-single-tenant-workflows-azure-portal.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -456,7 +456,7 @@ By default, your Standard logic app authenticates access to your Azure Storage a
456
456
457
457
For more information, see [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal) and [Understand role assignments](../role-based-access-control/role-assignments.md).
458
458
459
-
1.[Follow these steps to add the user-assigned managed identity to your Standard logic app resource](authenticate-with-managed-identity.md?tabs=standard#add-user-assigned-identity-to-logic-app-in-the-azure-portal).
459
+
1.[Follow these steps to add the user-assigned managed identity to your Standard logic app resource](authenticate-with-managed-identity.md?tabs=standard#add-user-identity-portal).
460
460
461
461
1. If your Standard logic app uses the hosting option named **Workflow Service Plan**, enable runtime scale monitoring:
Copy file name to clipboardExpand all lines: articles/logic-apps/set-up-cd-deployment-center-standard.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,11 +65,11 @@ The following example shows where to find the **SCM Basic Auth Publishing Creden
65
65
66
66
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
67
67
68
-
1. Follow the [general steps to create the user-assigned managed identity](authenticate-with-managed-identity.md?tabs=standard#create-user-assigned-identity-in-the-azure-portal).
68
+
1. Follow the [general steps to create the user-assigned managed identity](authenticate-with-managed-identity.md?tabs=standard#user-assigned-azure-portal).
69
69
70
70
1. Follow the [general steps to add the user-assigned managed identity to your logic app](authenticate-with-managed-identity.md?tabs=standard#add-user-assigned-identity-to-logic-app-in-the-azure-portal).
71
71
72
-
1. Follow the [general steps to give the identity access to the resources](authenticate-with-managed-identity.md?tabs=standard#give-identity-access-to-resources) in the [Prerequisites section](#prerequisites).
72
+
1. Follow the [general steps to give the identity access to the resources](authenticate-with-managed-identity.md?tabs=standard#access-other-resources) in the [Prerequisites section](#prerequisites).
73
73
74
74
1. When you're done, continue on to create scripts for Deployment Center.
0 commit comments