You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/authenticate-with-managed-identity.md
+34-25Lines changed: 34 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,42 +1,39 @@
1
1
---
2
-
title: Authenticate access and connections with managed identities
3
-
description: Set up a managed identity to authenticate workflow access to Microsoft Entra protected resources without using credentials, secrets, or tokens in Azure Logic Apps.
2
+
title: Authenticate Access for Connections with Managed Identities
3
+
description: Set up a managed identity to authenticate connection access from workflows in Azure Logic Apps to Microsoft Entra ID protected resources without using credentials, secrets, or tokens.
4
4
services: logic-apps
5
5
ms.suite: integration
6
-
ms.reviewer: estfan, azla
6
+
ms.reviewers: estfan, azla
7
7
ms.topic: how-to
8
-
ms.date: 01/27/2025
8
+
ms.date: 03/09/2026
9
+
ms.date-cycle: 365 days
9
10
ms.custom:
10
11
- subject-rbac-steps
11
12
- devx-track-arm-template
12
13
- sfi-image-nochange
13
-
14
-
##customerIntent: As a logic app developer, I want to authenticate connections for my logic app workflow using a managed identity so I don't have to use credentials or secrets.
14
+
##Customer intent: As an integration developer who works with Azure Logic Apps, I want to authenticate access for connections in my workflows by using a managed identity to avoid managing credentials or secrets.
15
15
---
16
16
17
-
# Authenticate access and connections to Azure resources with managed identities in Azure Logic Apps
17
+
# Authenticate connection access to protected Azure resources using managed identities in Azure Logic Apps
If you want to avoid providing, storing, and managing credentials, secrets, or Microsoft Entra tokens, you can use a managed identity to authenticate access or connections from your logic app workflow to Microsoft Entra protected resources. In Azure Logic Apps, some connector operations support using a managed identity when you must authenticate access to resources protected by Microsoft Entra ID. Azure manages this identity and helps keep authentication information secure so that you don't have to manage this sensitive information. For more information, see [What are managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)?
21
+
When you need to authenticate connection access to Microsoft Entra ID protected resources from your logic app workflows, use a *managed identity* to avoid storing and managing credentials, secrets, or Microsoft Entra tokens. Azure manages this identity and helps keep authentication information secure so you don't have to manage this sensitive information.
22
+
23
+
In Azure Logic Apps, some connectors support managed identity authentication when your workflow needs access to resources protected by Microsoft Entra ID. For more information, see [What are managed identities for Azure resources](/entra/identity/managed-identities-azure-resources/overview)?
22
24
23
25
Azure Logic Apps supports the following managed identity types:
The following list describes some differences between these managed identity types:
30
-
31
-
- A logic app resource can enable and use only one unique system-assigned identity.
32
-
33
-
- A logic app resource can share the same user-assigned identity across a group of other logic app resources.
34
-
35
30
This guide shows how to complete the following tasks:
36
31
37
32
- Enable and set up the system-assigned identity for your logic app resource. This guide provides an example that shows how to use the identity for authentication.
38
33
39
-
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication. For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
34
+
- Create and set up a user-assigned identity. This guide shows how to create this identity using the Azure portal or an Azure Resource Manager template (ARM template) and how to use the identity for authentication.
35
+
36
+
For Azure PowerShell, Azure CLI, and Azure REST API, see:
40
37
41
38
| Tool | Documentation |
42
39
|------|---------------|
@@ -46,19 +43,31 @@ This guide shows how to complete the following tasks:
46
43
47
44
## Prerequisites
48
45
49
-
- An Azure account and subscription. If you don't have a subscription, [sign up for a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn). Both the managed identity and the target Azure resource where you need access must use the same Azure subscription.
46
+
- An Azure account and subscription. [Get a free Azure account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn).
47
+
48
+
Both the managed identity and the target Azure resource where you need access must use the same Azure subscription.
49
+
50
+
- The target Azure resource that you want to access.
51
+
52
+
- On this resource, you must add the necessary role to the managed identity that acts on behalf of your logic app. To add a role to a managed identity, you need [Microsoft Entra administrator permissions](/entra/identity/role-based-access-control/permissions-reference) that can assign roles to the identities in the corresponding Microsoft Entra tenant.
53
+
54
+
- The logic app resource and workflow where you want to use the [operations that support managed identities](logic-apps-securing-a-logic-app.md#authentication-types-supported-triggers-actions).
55
+
56
+
## Considerations for using managed identities
57
+
58
+
- Your logic app resource can have and use only one unique system-assigned identity.
50
59
51
-
-The target Azure resource that you want to access. On this resource, you must add the necessary role for the managed identity to access that resource on your logic app's or connection's behalf. To add a role to a managed identity, you need [Microsoft Entra administrator permissions](/entra/identity/role-based-access-control/permissions-reference) that can assign roles to the identities in the corresponding Microsoft Entra tenant.
60
+
-Your logic app resource can have multiple user-assigned identities, but use only one user-assigned identity at a time.
52
61
53
-
-The logic app resource and workflow where you want to use the [trigger or actions that support managed identities](logic-apps-securing-a-logic-app.md#authentication-types-supported-triggers-actions).
62
+
-You can use the same user-assigned identity across other logicapp resources.
54
63
55
64
## Managed identity differences between Consumption and Standard logic apps
56
65
57
66
Based on your logic app resource type, you can enable either the system-assigned identity, user-assigned identity, or both at the same time:
58
67
59
68
| Logic app | Environment | Managed identity support |
| Consumption | - Multitenant Azure Logic Apps | - You can enable *either* the system-assigned identity or the user-assigned identity, but not both on your logic app. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>- If you create and enable the user-assigned identity, your logic app can have *only one* user-assigned identity at a time. |
70
+
| Consumption | - Multitenant Azure Logic Apps | - You can enable *either* the system-assigned identity or the user-assigned identity, but not both at the same time. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>- If you create and enable the user-assigned identity, your logic app can have *only one* user-assigned identity at a time. |
62
71
| Standard | - Single-tenant Azure Logic Apps <br><br>- App Service Environment v3 (ASEv3) | - You can enable *both* the system-assigned identity, which is enabled by default, and the user-assigned identity at the same time. You can also add multiple user-assigned identities to your logic app. However, your logic app can use only one managed identity at a time. <br><br>- You can use the managed identity at the logic app resource level and at the connection level. <br><br>**Note**: For hybrid deployment, managed identity authentication is currently unsupported. Instead, you must create and use an app registration. For more information, see [Create Standard logic app workflows for hybrid deployment on your own infrastructure](create-standard-workflows-hybrid-deployment.md). |
63
72
64
73
For information about managed identity limits in Azure Logic Apps, see [Limits on managed identities for logic apps](logic-apps-limits-and-config.md#managed-identity). For more information about the Consumption and Standard logic app resource types and environments, see [Resource environment differences](logic-apps-overview.md#resource-environment-differences).
@@ -83,7 +92,7 @@ For a Consumption logic app workflow, the following table lists example connecto
83
92
| Connector type | Supported connectors |
84
93
|----------------|----------------------|
85
94
| Built-in | - Azure API Management <br>- Azure App Services <br>- Azure Functions <br>- HTTP <br>- HTTP + Webhook <br><br>**Note**: HTTP operations can authenticate connections to Azure Storage accounts behind Azure firewalls with the system-assigned identity. However, HTTP operations don't support the user-assigned identity for authenticating the same connections. |
86
-
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>-Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
95
+
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>-Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Microsoft Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
87
96
88
97
### [Standard](#tab/standard)
89
98
@@ -92,7 +101,7 @@ For a Standard logic app workflow, the following table lists example connectors
92
101
| Connector type | Supported connectors |
93
102
|----------------|----------------------|
94
103
| Built-in | - Azure Automation <br>- Azure Blob Storage <br>- Azure Event Hubs <br>- Azure Service Bus <br>- Azure Queues <br>- Azure Tables <br>- HTTP <br>- HTTP + Webhook <br>- SQL Server <br><br>**Note**: Except for the SQL Server and HTTP connectors, most [built-in, service provider-based connectors](/azure/logic-apps/connectors/built-in/reference/) currently don't support selecting user-assigned identities for authentication. Instead, you must use the system-assigned identity. HTTP operations can authenticate connections to Azure Storage accounts behind Azure firewalls with the system-assigned identity. |
95
-
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>- Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Sentinel <br>- Azure Table Storage <br>- Azure VM <br>- SQL Server |
104
+
| Managed | - Azure App Service <br>- Azure Automation <br>- Azure Blob Storage <br>- Azure Container Instance <br>- Azure Cosmos DB <br>- Azure Data Explorer <br>- Azure Data Factory <br>- Azure Data Lake <br>- Azure Digital Twins <br>- Azure Event Grid <br>- Azure Event Hubs <br>- Azure IoT Central V2 <br>- Azure Key Vault <br>- Azure Monitor Logs <br>- Azure Queues <br>- Azure Resource Manager <br>- Azure Service Bus <br>- Azure Table Storage <br>- Azure VM <br>- Microsoft Sentinel <br>- SQL Server |
96
105
97
106
---
98
107
@@ -519,7 +528,7 @@ Before you can use your logic app's managed identity for authentication, you hav
519
528
> suppose you have a managed identity for a logic app that needs access to update the application
520
529
> settings for that same logic app from a workflow. You must give that identity access to the associated logic app.
521
530
522
-
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (Azure RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
531
+
For example, to use a managed identity for authenticating access to a Blob storage account or key vault in Azure, you need to set up Azure role-based access control (RBAC) and assign the appropriate role for that identity to the storage account or key vault, respectively.
523
532
524
533
The steps in this section describe how to assign role-based access using the [Azure portal](#azure-portal-assign-role) and [Azure Resource Manager template (ARM template)](../role-based-access-control/role-assignments-template.md). For Azure PowerShell, Azure CLI, and Azure REST API, see the following documentation:
525
534
@@ -819,7 +828,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
819
828
820
829
The following example shows a sample HTTP action with all the previously described property values to use for the Snapshot Blob operation:
821
830
822
-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
831
+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-consumption.png" alt-text="Screenshot shows Azure portal, Consumption workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-consumption.png":::
823
832
824
833
1. In the **HTTP** action, add the **Authentication** property. From the **Advanced parameters** list, select **Authentication**.
825
834
@@ -883,7 +892,7 @@ To run the [Snapshot Blob operation](/rest/api/storageservices/snapshot-blob), t
883
892
884
893
The following example shows a sample HTTP action with all the previously described property values to use for the Snapshot Blob operation:
885
894
886
-
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action set up to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
895
+
:::image type="content" source="media/authenticate-with-managed-identity/http-action-example-standard.png" alt-text="Screenshot shows Azure portal, Standard workflow, and HTTP action setup to access resources." lightbox="media/authenticate-with-managed-identity/http-action-example-standard.png":::
887
896
888
897
1. In the **HTTP** action, add the **Authentication** property. From the **Advanced parameters** list, select **Authentication**.
Copy file name to clipboardExpand all lines: articles/logic-apps/estimate-storage-costs.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,12 @@
1
1
---
2
-
title: Estimate storage costs for single-tenant Azure Logic Apps
2
+
title: Estimate Storage Costs for Standard Workflows
3
3
description: Estimate storage costs for Standard logic app workflows using the Logic Apps Storage Calculator.
4
4
services: logic-apps
5
5
ms.suite: integration
6
-
ms.reviewer: estfan, azla
6
+
ms.reviewers: estfan, azla
7
7
ms.topic: how-to
8
-
ms.date: 01/10/2024
8
+
ms.date: 03/10/2026
9
+
#Customer intent: As an integration solutions developer who works with Azure Logic Apps, I want to estimate the storage cost for my Standard logic app workflow.
9
10
---
10
11
11
12
# Estimate storage costs for Standard logic app workflows in single-tenant Azure Logic Apps
@@ -15,7 +16,8 @@ ms.date: 01/10/2024
15
16
Azure Logic Apps uses [Azure Storage](../storage/index.yml) for any storage operations. In traditional *multitenant* Azure Logic Apps, any storage usage and costs are attached to the logic app. Now, in *single-tenant* Azure Logic Apps, you can use your own storage account. These storage costs are listed separately in your Azure billing invoice. This capability gives you more flexibility and control over your logic app data.
16
17
17
18
> [!NOTE]
18
-
> This article applies to workflows in the single-tenant Azure Logic Apps environment. These workflows exist in the same logic app and in a single tenant that share the same storage. For more information, see [Single-tenant versus multitenant in Azure Logic Apps](single-tenant-overview-compare.md).
19
+
>
20
+
> This guide applies to Standard workflows in single-tenant Azure Logic Apps. These workflows exist in the same logic app and in a single tenant that share the same storage. For more information, see [Single-tenant versus multitenant in Azure Logic Apps](single-tenant-overview-compare.md).
19
21
20
22
Storage costs change based on your workflows' content. Different triggers, actions, and payloads result in different storage operations and needs. This article describes how to estimate your storage costs when you're using your own Azure Storage account with single-tenant based logic apps. First, you can [estimate the number of storage operations you'll perform](#estimate-storage-needs) using the Logic Apps storage calculator. Then, you can [estimate your possible storage costs](#estimate-storage-costs) using these numbers in the Azure pricing calculator.
21
23
@@ -160,4 +162,4 @@ To estimate monthly costs for your logic app's table storage operations:
160
162
## Next step
161
163
162
164
> [!div class="nextstepaction"]
163
-
> [Plan and manage costs for Logic Apps](plan-manage-costs.md)
165
+
> [Plan and manage costs for Azure Logic Apps](plan-manage-costs.md)
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.reviewer: azla
8
8
ms.topic: overview
9
9
ms.collection: ce-skilling-ai-copilot
10
10
ms.update-cycle: 180-days
11
-
ms.date: 09/11/2025
11
+
ms.date: 03/10/2026
12
12
#customer intent: As an integration developer, I want a high-level overview of Azure Logic Apps capabilities so that I can decide when to use Logic Apps for workflow automation.
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-perform-data-operations.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,8 @@ services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewer: estfan, azla
7
7
ms.topic: how-to
8
-
ms.date: 04/02/2025
8
+
ms.date: 03/10/2026
9
+
ms.update-cycle: 365-days
9
10
ms.custom: sfi-image-nochange
10
11
# Customer intent: As a developer using Azure Logic Apps, I want to perform various data operations on various data types for my workflow in Azure Logic Apps.
0 commit comments