You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/azure-arc-enabled-logic-apps-create-deploy-workflows.md
+11-11
Original file line number
Diff line number
Diff line change
@@ -53,24 +53,24 @@ This section describes the common prerequisites across all the approaches and to
53
53
-[Set up an Azure Arc-enabled Kubernetes cluster to run App Service, Functions, and Logic Apps (Preview)](../app-service/manage-create-arc-environment.md)
54
54
-[Change the default scaling behavior](#change-scaling)
55
55
56
-
- Your own Azure Active Directory (Azure AD) identity
56
+
- Your own Microsoft Entra identity
57
57
58
-
If your workflows need to use any Azure-hosted connections, such as Office 365 Outlook or Azure Storage, your logic app must use an Azure AD identity for authentication. Azure Arc-enabled Logic Apps can run on any infrastructure but requires an identity that has permissions to use Azure-hosted connections. To set up this identity, create an app registration in Azure AD that your logic app uses as the required identity.
58
+
If your workflows need to use any Azure-hosted connections, such as Office 365 Outlook or Azure Storage, your logic app must use a Microsoft Entra identity for authentication. Azure Arc-enabled Logic Apps can run on any infrastructure but requires an identity that has permissions to use Azure-hosted connections. To set up this identity, create an app registration in Microsoft Entra ID that your logic app uses as the required identity.
59
59
60
60
> [!NOTE]
61
61
> Managed identity support is currently unavailable for Azure Arc-enabled Logic Apps.
62
62
63
-
To create an Azure Active Directory (Azure AD) app registration using the Azure CLI, follow these steps:
63
+
To create a Microsoft Entra app registration using the Azure CLI, follow these steps:
64
64
65
65
1. Create an app registration by using the [`az ad sp create`](/cli/azure/ad/sp#az-ad-sp-create) command.
66
66
67
67
1. To review all the details, run the [`az ad sp show`](/cli/azure/ad/sp#az-ad-sp-show) command.
68
68
69
69
1. From the output of both commands, find and save the client ID, object ID, tenant ID, and client secret values, which you need to keep for later use.
70
70
71
-
To create an Azure Active Directory (Azure AD) app registration using the Azure portal, follow these steps:
71
+
To create a Microsoft Entra app registration using the Azure portal, follow these steps:
72
72
73
-
1. Create a new Azure AD app registration by using the [Azure portal](../active-directory/develop/quickstart-register-app.md).
73
+
1. Create a new Microsoft Entra app registration by using the [Azure portal](../active-directory/develop/quickstart-register-app.md).
74
74
75
75
1. After creation finishes, find the new app registration in the portal.
76
76
@@ -283,9 +283,9 @@ You can create, deploy, and monitor your logic app workflows from end to end in
283
283
284
284
1. Select or create a new Application Insights resource for storing application logs for your logic app.
285
285
286
-
1. If you haven't done so, set up your Azure Active Directory (Azure AD) identity so that your logic app can authenticate managed API connections. For more information, see the top-level [Prerequisites](#prerequisites).
286
+
1. If you haven't done so, set up your Microsoft Entra identity so that your logic app can authenticate managed API connections. For more information, see the top-level [Prerequisites](#prerequisites).
287
287
288
-
1. Enter the client ID, tenant ID, object ID, and client secret for your Azure AD identity.
288
+
1. Enter the client ID, tenant ID, object ID, and client secret for your Microsoft Entra identity.
289
289
290
290
> [!NOTE]
291
291
> You only have to complete this step once. Visual Studio Code updates your project's
@@ -316,9 +316,9 @@ The portal-based designer's editing capability is currently under development fo
316
316
317
317
Currently, Azure Arc-enabled Kubernetes clusters don't support using a logic app's managed identity to authenticate managed API connections. You create these Azure-hosted and managed connections when you use managed connectors in your workflows.
318
318
319
-
Instead, you have to create your own app registration in Azure Active Directory (Azure AD). You can then use this app registration as an identity for logic apps deployed and running in Azure Arc-enabled Logic Apps. For more information, review the [top-level prerequisites](#prerequisites).
319
+
Instead, you have to create your own app registration in Microsoft Entra ID. You can then use this app registration as an identity for logic apps deployed and running in Azure Arc-enabled Logic Apps. For more information, review the [top-level prerequisites](#prerequisites).
320
320
321
-
From your app registration, you need the client ID, object ID, tenant ID, and client secret. If you use Visual Studio Code to deploy, you have a built-in experience for setting up your logic app with an Azure AD identity. For more information, review [Create and deploy logic app workflows - Visual Studio Code](#create-and-deploy-logic-apps).
321
+
From your app registration, you need the client ID, object ID, tenant ID, and client secret. If you use Visual Studio Code to deploy, you have a built-in experience for setting up your logic app with a Microsoft Entra identity. For more information, review [Create and deploy logic app workflows - Visual Studio Code](#create-and-deploy-logic-apps).
322
322
323
323
However, if you use Visual Studio Code for development, but you use Azure CLI or automated pipelines to deploy, follow these steps.
324
324
@@ -367,8 +367,8 @@ In your Azure Resource Manager template (ARM template), include the following re
367
367
| Parameter | Description |
368
368
|-----------|-------------|
369
369
| <*connection-name*> | The name for your managed API connection, for example `office365`|
370
-
| <*object-ID*> | The object ID for your Azure AD identity, previously saved from your app registration |
371
-
| <*tenant-ID*> | The tenant ID for your Azure AD identity, previously saved from your app registration |
370
+
| <*object-ID*> | The object ID for your Microsoft Entra identity, previously saved from your app registration |
371
+
| <*tenant-ID*> | The tenant ID for your Microsoft Entra identity, previously saved from your app registration |
Copy file name to clipboardExpand all lines: articles/logic-apps/biztalk-server-to-azure-integration-services-overview.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -566,7 +566,7 @@ BizTalk includes [Enterprise Single Sign-On (SSO)](/biztalk/core/enterprise-sing
566
566
567
567
- Managed identities
568
568
569
-
Some connectors support using a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) for authenticating access to resources protected by Azure Active Directory (Azure AD). When you use a managed identity to authenticate your connection, you don't have to provide credentials, secrets, or Azure AD tokens.
569
+
Some connectors support using a [managed identity](../active-directory/managed-identities-azure-resources/overview.md) for authenticating access to resources protected by Microsoft Entra ID. When you use a managed identity to authenticate your connection, you don't have to provide credentials, secrets, or Microsoft Entra tokens.
570
570
571
571
### Application management and access management
572
572
@@ -837,7 +837,7 @@ For the latest information, see [Service Bus Premium and Standard messaging tier
837
837
838
838
Azure API Management offers various pricing tiers so that you can choose the best tier that meets your needs. Each tier has its own capabilities and are named Consumption, Developer, Basic, Standard, and Premium.
839
839
840
-
The capabilities in these tiers range from Azure AD integration, Azure virtual network support, built-in cache, self-hosted gateways, and more. For more information about these tiers and their capabilities, see [Feature-based comparison of the Azure API Management tiers](../api-management/api-management-features.md).
840
+
The capabilities in these tiers range from Microsoft Entra integration, Azure virtual network support, built-in cache, self-hosted gateways, and more. For more information about these tiers and their capabilities, see [Feature-based comparison of the Azure API Management tiers](../api-management/api-management-features.md).
841
841
842
842
##### Azure Data Factory
843
843
@@ -919,7 +919,7 @@ The following table and diagram roughly show how resources, artifacts, features,
919
919
| EDI | - BizTalk Server out-of-the-box capabilities <br>- Parties, partners, agreements, AS2, X12, EDIFACT | Azure Logic Apps and Azure Integration Account (partners, agreements, AS2, X12, EDIFACT) |
920
920
| HL7, RosettaNet, and SWIFT | BizTalk Server accelerators for HL7, RosettaNet, and SWIFT | - Azure Logic Apps, RosettaNet and SWIFT connectors, and Azure Integration Account <br>- Azure API Management for FHIR (HL7) <br>- Azure Blueprint, which enables SWIFT CSP compliance on Azure |
921
921
| Secrets | Enterprise Single Sign-On (SSO) | - Azure Key Vault <br>- SQL Server <br>- Application configuration |
| Tracking | - BizTalk Server tracking capabilities (Receive ports, Send ports, pipelines, orchestrations) <br>- IIS tracking <br>- Azure API Management built-in analytics (hybrid capabilities) | - Azure Logic Apps run history and tracked properties <br>- Azure Storage Account <br>- Azure Monitor (Application Insights) <br>- Azure API Management built-in analytics <br>- Custom solution, for example, Azure Event Hubs plus Azure Functions plus SQL Server plus Azure Data Explorer |
Copy file name to clipboardExpand all lines: articles/logic-apps/block-connections-across-tenants.md
+8-8
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Block access to and from other tenants
3
-
description: Block connections between your tenant and other Azure Active Directory (Azure AD) tenants in Azure Logic Apps.
3
+
description: Block connections between your tenant and other Microsoft Entra tenants in Azure Logic Apps.
4
4
services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewer: estfan, azla
7
7
ms.topic: how-to
8
8
ms.date: 08/01/2022
9
-
# Customer intent: As a developer, I want to prevent access to and from other Azure Active Directory tenants.
9
+
# Customer intent: As a developer, I want to prevent access to and from other Microsoft Entra tenants.
10
10
---
11
11
12
12
# Block connections to and from other tenants in Azure Logic Apps (Preview)
@@ -15,11 +15,11 @@ ms.date: 08/01/2022
15
15
> This capability is in preview and is subject to the
16
16
> [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
17
17
18
-
Azure Logic Apps includes many connectors for you to build integration apps and workflows and to access various data, apps, services, systems, and other resources. These connectors authorize your access to these resources by using Azure Active Directory (Azure AD) to authenticate your credentials.
18
+
Azure Logic Apps includes many connectors for you to build integration apps and workflows and to access various data, apps, services, systems, and other resources. These connectors authorize your access to these resources by using Microsoft Entra ID to authenticate your credentials.
19
19
20
-
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Azure AD tenant or different tenant by sending a consent link. This shared connection provides access to same resource but creates a security vulnerability.
20
+
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Microsoft Entra tenant or different tenant by sending a consent link. This shared connection provides access to same resource but creates a security vulnerability.
21
21
22
-
As a security measure to prevent this scenario, you can block access to and from your own Azure AD tenant through such shared connections. You can also permit but restrict connections only to specific tenants. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Azure AD authorized access.
22
+
As a security measure to prevent this scenario, you can block access to and from your own Microsoft Entra tenant through such shared connections. You can also permit but restrict connections only to specific tenants. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Microsoft Entra authorized access.
23
23
24
24
## Prerequisites
25
25
@@ -31,7 +31,7 @@ As a security measure to prevent this scenario, you can block access to and from
31
31
32
32
- Collect the following information:
33
33
34
-
- The tenant ID for your Azure AD tenant.
34
+
- The tenant ID for your Microsoft Entra tenant.
35
35
36
36
- The choice whether to enforce two-way tenant isolation for connections that don't have a client tenant ID.
37
37
@@ -47,7 +47,7 @@ As a security measure to prevent this scenario, you can block access to and from
47
47
48
48
- The choice whether to allow outbound connections from your tenant to each allowed tenant.
49
49
50
-
- To test the tenant isolation policy, you need a second Azure AD tenant. From this tenant, you'll try connecting to and from the isolated tenant after the isolation policy takes effect.
50
+
- To test the tenant isolation policy, you need a second Microsoft Entra tenant. From this tenant, you'll try connecting to and from the isolated tenant after the isolation policy takes effect.
51
51
52
52
## Request an isolation policy for your tenant
53
53
@@ -68,7 +68,7 @@ After the policy takes effect in a region, test the policy. You can try immediat
68
68
69
69
### Test inbound connections to your tenant
70
70
71
-
1. Sign in to your "other" Azure AD tenant.
71
+
1. Sign in to your "other" Microsoft Entra tenant.
72
72
73
73
1. Create logic app workflow with a connection, such as Office 365 Outlook.
Copy file name to clipboardExpand all lines: articles/logic-apps/block-connections-connectors.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -286,7 +286,7 @@ For more information about Azure Policy definitions, see these topics:
286
286
287
287
## Create policy assignment
288
288
289
-
Next, you need to assign the policy definition where you want to enforce the policy, for example, to a single resource group, multiple resource groups, Azure Active Directory (Azure AD) tenant, or Azure subscription. For this task, follow these steps to create a policy assignment:
289
+
Next, you need to assign the policy definition where you want to enforce the policy, for example, to a single resource group, multiple resource groups, Microsoft Entra tenant, or Azure subscription. For this task, follow these steps to create a policy assignment:
290
290
291
291
1. In the [Azure portal](https://portal.azure.com), portal search box, enter **policy**, and select **Policy**.
0 commit comments