Skip to content

Commit 79f1473

Browse files
committed
Refresh updates
1 parent 6c58af0 commit 79f1473

2 files changed

Lines changed: 22 additions & 26 deletions

File tree

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 22 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1082,7 +1082,7 @@ The following example shows the `parameters` object when the *user-assigned* man
10821082

10831083
### [Standard](#tab/standard)
10841084

1085-
In a Standard logic app resource, you save the connection configuration in the logic app resource or project's *connections.json* file. This file contains a `managedApiConnections` object that includes connection configuration information for each managed connector used in a workflow. This connection information includes pointers to the connection's resource ID along with the managed identity properties, such as the resource ID when the user-assigned identity is enabled.
1085+
In a Standard logic app resource, you save the connection configuration in the logic app resource or project's *connections.json* file. This file contains a `managedApiConnections` object that contains connection configuration information for each managed connector used in a workflow. This connection information has pointers to the connection's resource ID along with the managed identity properties, such as the resource ID when the logic app enables the user-assigned identity.
10861086

10871087
This example shows the `managedApiConnections` object configuration when the logic app enables the *system-assigned* identity:
10881088

@@ -1145,7 +1145,7 @@ This example shows the `managedApiConnections` object configuration when the log
11451145

11461146
## ARM template for API connections and managed identities
11471147

1148-
If you use an ARM template to automate deployment, and your workflow includes an API connection that's created by a [managed connector](../connectors/managed.md) that uses a managed identity, you need to take an extra step.
1148+
If you use an ARM template to automate deployment, and your workflow includes an API connection, which is created by a [managed connector](../connectors/managed.md), that uses a managed identity, you need to take an extra step.
11491149

11501150
In an ARM template, the underlying connector resource definition differs based on whether you have a Consumption or Standard logic app resource and whether the [connector shows single-authentication or multi-authentication options](#managed-connectors-managed-identity).
11511151

@@ -1281,11 +1281,11 @@ This example shows the underlying connection resource definition for a connector
12811281
}
12821282
```
12831283

1284-
In the subsequent **Microsoft.Web/connections** resource definition, make sure that you add an access policy that specifies a resource definition for each API connection and provide the following information:
1284+
In the subsequent `Microsoft.Web/connections` resource definition, you need to add an access policy that specifies a resource definition for each API connection and provide the following information:
12851285

12861286
| Parameter | Description |
12871287
|-----------|-------------|
1288-
| <*connection-name*> | The name for your API connection, such as **azureblob**. |
1288+
| <*connection-name*> | The name for your API connection, such as `azureblob`. |
12891289
| <*object-ID*> | The object ID for your Microsoft Entra identity, previously saved from your app registration. |
12901290
| <*tenant-ID*> | The tenant ID for your Microsoft Entra identity, previously saved from your app registration. |
12911291

@@ -1316,7 +1316,7 @@ For more information, see [Microsoft.Web/connections/accesspolicies (ARM templat
13161316

13171317
<a name="setup-identity-apihub-authentication"></a>
13181318

1319-
## Set up advanced control over API connection authentication
1319+
## Set up advanced control for API connection authentication
13201320

13211321
When your Standard logic app workflow uses an API connection that a [managed connector](../connectors/managed.md) creates, Azure Logic Apps uses two connections to communicate with the target resource, such as your email account or key vault:
13221322

@@ -1326,9 +1326,9 @@ When your Standard logic app workflow uses an API connection that a [managed con
13261326

13271327
- Connection #2 is set up with authentication for the target resource.
13281328

1329-
However, when a Consumption logic app workflow uses an API connection, you don't see and can't configure connection #1. By using the Standard logic app resource, you get more control over your logic app and workflows. By default, connection #1 uses the system-assigned identity.
1329+
However, when a Consumption logic app workflow uses an API connection, you can't view or set up connection #1. If you use a Standard logic app resource, you gain more control over your logic app and workflows. By default, connection #1 uses the system-assigned identity.
13301330

1331-
If your scenario requires finer control over authenticating API connections, you can change the authentication for connection #1 from the default system-assigned identity to any user-assigned identity that you add to your logic app. This authentication applies to each API connection, so you can mix system-assigned and user-assigned identities across different connections to the same target resource.
1331+
If your scenario requires finer control over authenticating API connections, change the authentication for connection #1 from the default system-assigned identity to any user-assigned identity that you add to your logic app. This authentication applies to each API connection, so you can mix system-assigned and user-assigned identities across different connections to the same target resource.
13321332

13331333
In your Standard logic app's *connections.json* file, which stores information about each API connection, each connection definition has two `authentication` objects, for example:
13341334

@@ -1404,9 +1404,9 @@ In other scenarios, you might not want to set up the system-assigned identity on
14041404
}
14051405
```
14061406

1407-
1. In the connection definition, complete the following steps:
1407+
1. In the connection definition, follow these steps:
14081408

1409-
1. Find the first `authentication` section. If no `identity` property exists in this `authentication` section, the logic app implicitly uses the system-assigned identity.
1409+
1. Find the first `authentication` object. If no `identity` property exists in this `authentication` object, the logic app implicitly uses the system-assigned identity.
14101410

14111411
1. Add an `identity` property by using the example in this step.
14121412

@@ -1443,25 +1443,23 @@ In other scenarios, you might not want to set up the system-assigned identity on
14431443

14441444
## Disable managed identity
14451445

1446-
To stop using the managed identity for authentication, first [remove the identity's access to the target resource](#disable-identity-target-resource). Next, on your logic app resource, [turn off the system-assigned identity or remove the user-assigned identity](#disable-identity-logic-app).
1446+
To stop using the managed identity for authentication, follow these steps:
14471447

1448-
When you disable the managed identity on your logic app resource, you remove the capability for that identity to request access to Azure resources where the identity had access.
1448+
1. [Remove the identity's access to the target resource](#disable-identity-target-resource).
1449+
1450+
1. On your logic app resource, [disable the system-assigned identity or remove the user-assigned identity](#disable-identity-logic-app).
1451+
1452+
When you turn off the managed identity on your logic app resource, you remove the capability for that identity to request access to Azure resources where the identity had access.
14491453

14501454
> [!NOTE]
14511455
>
1452-
> If you disable the system-assigned identity, all the connections that use the identity
1453-
> in the logic app's workflows stop working at runtime, even if you immediately enable the identity again.
1454-
> This behavior happens because disabling the identity deletes its object ID. Each time that you
1455-
> enable the identity, Azure generates the identity with a different and unique object ID. To resolve
1456-
> this problem, you need to recreate the connections so that they use the current object ID for the
1457-
> current system-assigned identity.
1456+
> If you disable the system-assigned identity, all the connections that use the identity in the logic app's workflows stop working at runtime, even if you immediately enable the identity again.
14581457
>
1459-
> Try to avoid disabling the system-assigned identity as much as possible. If you want to remove
1460-
> the identity's access to Azure resources, remove the identity's role assignment from the target
1461-
> resource. If you delete your logic app resource, Azure automatically removes the managed identity
1462-
> from Microsoft Entra ID.
1458+
> This behavior happens because disabling the identity deletes its object ID. Each time that you enable the identity, Azure generates the identity with a different and unique object ID. To fix this problem, recreate the connections so they use the current object ID for the current system-assigned identity.
1459+
>
1460+
> Avoid disabling the system-assigned identity as much as possible. To remove the identity's access to Azure resources, remove the identity's role assignment from the target resource. If you delete your logic app resource, Azure automatically removes the managed identity from Microsoft Entra ID.
14631461
1464-
The steps in this section cover using the [Azure portal](#azure-portal-disable) and [Azure Resource Manager template (ARM template)](#template-disable). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
1462+
The following sections show how to disable the managed identiy by using the [Azure portal](#azure-portal-disable) and [Azure Resource Manager template (ARM template)](#template-disable). For Azure PowerShell, Azure CLI, and Azure REST API, see:
14651463

14661464
| Tool | Documentation |
14671465
|------|---------------|
@@ -1489,11 +1487,9 @@ The following steps remove access to the target resource from the managed identi
14891487

14901488
1. In the roles list, select the managed identities that you want to remove. On the toolbar, select **Remove**.
14911489

1492-
> [!TIP]
1490+
> [!NOTE]
14931491
>
1494-
> If the **Remove** option is disabled, you most likely don't have permissions.
1495-
> For more information about the permissions that let you manage roles for resources, see
1496-
> [Administrator role permissions in Microsoft Entra ID](/entra/identity/role-based-access-control/permissions-reference).
1492+
> If the **Remove** option is disabled, you most likely don't have permissions. For more information about the permissions that let you manage roles for resources, see [Administrator role permissions in Microsoft Entra ID](/entra/identity/role-based-access-control/permissions-reference).
14971493
14981494
<a name="disable-identity-logic-app"></a>
14991495

10.7 KB
Loading

0 commit comments

Comments
 (0)