Skip to content

Commit 8bca344

Browse files
Merge pull request #312871 from ecfan/freshness
[Azure Logic Apps][Freshness] Date updates + SEO improvements suggested by Documentor
2 parents daa771d + 0e285dc commit 8bca344

15 files changed

Lines changed: 179 additions & 126 deletions

articles/logic-apps/authenticate-with-managed-identity.md

Lines changed: 34 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,39 @@
11
---
2-
title: Authenticate access and connections with managed identities
3-
description: Set up a managed identity to authenticate workflow access to Microsoft Entra protected resources without using credentials, secrets, or tokens in Azure Logic Apps.
2+
title: Authenticate Access for Connections with Managed Identities
3+
description: Set up a managed identity to authenticate connection access from workflows in Azure Logic Apps to Microsoft Entra ID protected resources without using credentials, secrets, or tokens.
44
services: logic-apps
55
ms.suite: integration
6-
ms.reviewer: estfan, azla
6+
ms.reviewers: estfan, azla
77
ms.topic: how-to
8-
ms.date: 01/27/2025
8+
ms.date: 03/09/2026
9+
ms.date-cycle: 365 days
910
ms.custom:
1011
- subject-rbac-steps
1112
- devx-track-arm-template
1213
- sfi-image-nochange
13-
14-
##customerIntent: As a logic app developer, I want to authenticate connections for my logic app workflow using a managed identity so I don't have to use credentials or secrets.
14+
##Customer intent: As an integration developer who works with Azure Logic Apps, I want to authenticate access for connections in my workflows by using a managed identity to avoid managing credentials or secrets.
1515
---
1616

17-
# Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps
17+
# Authenticate connection access to protected Azure resources using managed identities in Azure Logic Apps
1818

1919
[!INCLUDE [logic-apps-sku-consumption-standard](../../includes/logic-apps-sku-consumption-standard.md)]
2020

21-
If you want to avoid providing, storing, and managing credentials, secrets, or Microsoft Entra tokens, you can use a managed identity to authenticate access or connections from your logic app workflow to Microsoft Entra protected resources. In Azure Logic Apps, some connector operations support using a managed identity when you must authenticate access to resources protected by Microsoft Entra ID. Azure manages this identity and helps keep authentication information secure so that you don't have to manage this sensitive information. For more information, see [What are managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)?
21+
When you need to authenticate connection access to Microsoft Entra ID protected resources from your logic app workflows, use a *managed identity* to avoid storing and managing credentials, secrets, or Microsoft Entra tokens. Azure manages this identity and helps keep authentication information secure so you don't have to manage this sensitive information.
22+
23+
In Azure Logic Apps, some connectors support managed identity authentication when your workflow needs access to resources protected by Microsoft Entra ID. For more information, see [What are managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)?
2224

2325
Azure Logic Apps supports the following managed identity types:
2426

2527
- [System-assigned managed identity](/entra/identity/managed-identities-azure-resources/overview#managed-identity-types)
26-
2728
- [User-assigned managed identity](/entra/identity/managed-identities-azure-resources/overview#managed-identity-types)
2829

29-
The following list describes some differences between these managed identity types:
30-
31-
- A logic app resource can enable and use only one unique system-assigned identity.
32-
33-
- A logic app resource can share the same user-assigned identity across a group of other logic app resources.
34-
3530
This guide shows how to complete the following tasks:
3631

3732
- Enable and set up the system-assigned identity for your logic app resource. This guide provides an example that shows how to use the identity for authentication.
3833

39-
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication. For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
34+
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication.
35+
36+
For Azure PowerShell, Azure CLI, and Azure REST API, see:
4037

4138
| Tool | Documentation |
4239
|------|---------------|
@@ -46,19 +43,31 @@ This guide shows how to complete the following tasks:
4643

4744
## Prerequisites
4845

49-
- An Azure account and subscription. If you don't have a subscription, [sign up for a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn). Both the managed identity and the target Azure resource where you need access must use the same Azure subscription.
46+
- An Azure account and subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
47+
48+
Both the managed identity and the target Azure resource where you need access must use the same Azure subscription.
49+
50+
- The target Azure resource that you want to access.
51+
52+
- On this resource, you must add the necessary role to the managed identity that acts on behalf of your logic app. To add a role to a managed identity, you need [Microsoft Entra administrator permissions](/entra/identity/role-based-access-control/permissions-reference) that can assign roles to the identities in the corresponding Microsoft Entra tenant.
53+
54+
- The logic app resource and workflow where you want to use the [operations that support managed identities](logic-apps-securing-a-logic-app.md#authentication-types-supported-triggers-actions).
55+
56+
## Considerations for using managed identities
57+
58+
- Your logic app resource can have and use only one unique system-assigned identity.
5059

51-
- The target Azure resource that you want to access. On this resource, you must add the necessary role for the managed identity to access that resource on your logic app's or connection's behalf. To add a role to a managed identity, you need [Microsoft Entra administrator permissions](/entra/identity/role-based-access-control/permissions-reference) that can assign roles to the identities in the corresponding Microsoft Entra tenant.
60+
- Your logic app resource can have multiple user-assigned identities, but use only one user-assigned identity at a time.
5261

53-
- The logic app resource and workflow where you want to use the [trigger or actions that support managed identities](logic-apps-securing-a-logic-app.md#authentication-types-supported-triggers-actions).
62+
- You can use the same user-assigned identity across other logic app resources.
5463

5564
## Managed identity differences between Consumption and Standard logic apps
5665

5766
Based on your logic app resource type, you can enable either the system-assigned identity, user-assigned identity, or both at the same time:
5867

5968
| Logic app | Environment | Managed identity support |
6069
|-----------|-------------|--------------------------|
61-
| Consumption | - Multitenant Azure Logic Apps | - You can enable *either* the system-assigned identity or the user-assigned identity, but not both on your logic app. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>- If you create and enable the user-assigned identity, your logic app can have *only one* user-assigned identity at a time. |
70+
| Consumption | - Multitenant Azure Logic Apps | - You can enable *either* the system-assigned identity or the user-assigned identity, but not both at the same time. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>- If you create and enable the user-assigned identity, your logic app can have *only one* user-assigned identity at a time. |
6271
| Standard | - Single-tenant Azure Logic Apps <br><br>- App Service Environment v3 (ASEv3) | - You can enable *both* the system-assigned identity, which is enabled by default, and the user-assigned identity at the same time. You can also add multiple user-assigned identities to your logic app. However, your logic app can use only one managed identity at a time. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>**Note**: For hybrid deployment, managed identity authentication is currently unsupported. Instead, you must create and use an app registration. For more information, see [Create Standard logic app workflows for hybrid deployment on your own infrastructure](create-standard-workflows-hybrid-deployment.md). |
6372

6473
For information about managed identity limits in Azure Logic Apps, see [Limits on managed identities for logic apps](logic-apps-limits-and-config.md#managed-identity). For more information about the Consumption and Standard logic app resource types and environments, see [Resource environment differences](logic-apps-overview.md#resource-environment-differences).
@@ -83,7 +92,7 @@ For a Consumption logic app workflow, the following table lists example connecto
8392
| Connector type | Supported connectors |
8493
|----------------|----------------------|
8594
| Built-in | - Azure API Management <br>- Azure App Services <br>- Azure Functions <br>- HTTP <br>- HTTP + Webhook <br><br>**Note**: HTTP operations can authenticate connections to Azure Storage accounts behind Azure firewalls with the system-assigned identity. However, HTTP operations don't support the user-assigned identity for authenticating the same connections. |
86-
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>-Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
95+
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>-Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Microsoft Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
8796

8897
### [Standard](#tab/standard)
8998

@@ -92,7 +101,7 @@ For a Standard logic app workflow, the following table lists example connectors
92101
| Connector type | Supported connectors |
93102
|----------------|----------------------|
94103
| Built-in | - Azure Automation <br>- Azure Blob Storage <br>- Azure Event Hubs <br>- Azure Service Bus <br>- Azure Queues <br>- Azure Tables <br>- HTTP <br>- HTTP + Webhook <br>- SQL Server <br><br>**Note**: Except for the SQL Server and HTTP connectors, most [built-in, service provider-based connectors](/azure/logic-apps/connectors/built-in/reference/) currently don't support selecting user-assigned identities for authentication. Instead, you must use the system-assigned identity. HTTP operations can authenticate connections to Azure Storage accounts behind Azure firewalls with the system-assigned identity. |
95-
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>- Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
104+
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>- Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Table Storage <br>- Azure VM <br>- Microsoft Sentinel <br>- SQL Server |
96105

97106
---
98107

@@ -519,7 +528,7 @@ Before you can use your logic app's managed identity for authentication, you hav
519528
> suppose you have a managed identity for a logic app that needs access to update the application
520529
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
521530
522-
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
531+
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
523532

524533
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
525534

@@ -819,7 +828,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
819828

820829
The following example shows a sample HTTP action with all the previously described property values to use for the Snapshot Blob operation:
821830

822-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
831+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
823832

824833
1. In the **HTTP** action, add the **Authentication** property. From the **Advanced parameters** list, select **Authentication**.
825834

@@ -883,7 +892,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
883892

884893
The following example shows a sample HTTP action with all the previously described property values to use for the Snapshot Blob operation:
885894

886-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
895+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
887896

888897
1. In the **HTTP** action, add the **Authentication** property. From the **Advanced parameters** list, select **Authentication**.
889898

articles/logic-apps/estimate-storage-costs.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
---
2-
title: Estimate storage costs for single-tenant Azure Logic Apps
2+
title: Estimate Storage Costs for Standard Workflows
33
description: Estimate storage costs for Standard logic app workflows using the Logic Apps Storage Calculator.
44
services: logic-apps
55
ms.suite: integration
6-
ms.reviewer: estfan, azla
6+
ms.reviewers: estfan, azla
77
ms.topic: how-to
8-
ms.date: 01/10/2024
8+
ms.date: 03/10/2026
9+
#Customer intent: As an integration solutions developer who works with Azure Logic Apps, I want to estimate the storage cost for my Standard logic app workflow.
910
---
1011

1112
# Estimate storage costs for Standard logic app workflows in single-tenant Azure Logic Apps
@@ -15,7 +16,8 @@ ms.date: 01/10/2024
1516
Azure Logic Apps uses [Azure Storage](../storage/index.yml) for any storage operations. In traditional *multitenant* Azure Logic Apps, any storage usage and costs are attached to the logic app. Now, in *single-tenant* Azure Logic Apps, you can use your own storage account. These storage costs are listed separately in your Azure billing invoice. This capability gives you more flexibility and control over your logic app data.
1617

1718
> [!NOTE]
18-
> This article applies to workflows in the single-tenant Azure Logic Apps environment. These workflows exist in the same logic app and in a single tenant that share the same storage. For more information, see [Single-tenant versus multitenant in Azure Logic Apps](single-tenant-overview-compare.md).
19+
>
20+
> This guide applies to Standard workflows in single-tenant Azure Logic Apps. These workflows exist in the same logic app that is in a single tenant where all share the same storage. For more information, see [Single-tenant versus multitenant in Azure Logic Apps](single-tenant-overview-compare.md).
1921
2022
Storage costs change based on your workflows' content. Different triggers, actions, and payloads result in different storage operations and needs. This article describes how to estimate your storage costs when you're using your own Azure Storage account with single-tenant based logic apps. First, you can [estimate the number of storage operations you'll perform](#estimate-storage-needs) using the Logic Apps storage calculator. Then, you can [estimate your possible storage costs](#estimate-storage-costs) using these numbers in the Azure pricing calculator.
2123

@@ -160,4 +162,4 @@ To estimate monthly costs for your logic app's table storage operations:
160162
## Next step
161163

162164
> [!div class="nextstepaction"]
163-
> [Plan and manage costs for Logic Apps](plan-manage-costs.md)
165+
> [Plan and manage costs for Azure Logic Apps](plan-manage-costs.md)

articles/logic-apps/index.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,8 @@ metadata:
1010
ms.topic: landing-page
1111
author: ecfan
1212
ms.author: estfan
13-
ms.date: 03/27/2025
13+
ms.date: 03/10/2026
14+
ms.update-cycle: 365-days
1415

1516
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
1617

articles/logic-apps/logic-apps-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.reviewer: azla
88
ms.topic: overview
99
ms.collection: ce-skilling-ai-copilot
1010
ms.update-cycle: 180-days
11-
ms.date: 09/11/2025
11+
ms.date: 03/10/2026
1212
#customer intent: As an integration developer, I want a high-level overview of Azure Logic Apps capabilities so that I can decide when to use Logic Apps for workflow automation.
1313
---
1414

articles/logic-apps/logic-apps-perform-data-operations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
8-
ms.date: 04/02/2025
8+
ms.date: 03/10/2026
9+
ms.update-cycle: 365-days
910
ms.custom: sfi-image-nochange
1011
# Customer intent: As a developer using Azure Logic Apps, I want to perform various data operations on various data types for my workflow in Azure Logic Apps.
1112
---

0 commit comments

Comments
 (0)