Using Managed Identity for Microsoft Graph Authentication with Logic App (Real Demo)

preview_player
Показать описание
#LogicAPP #ManagedIdentity #graphapi #authentication
managed identity,managed service identity,microsoft,logic apps,graph api,azure active directory,role based access,azure ad,security,app service,passwordless,azure,secure
Managed Identity
Authentication
Microsoft Graph
Logic Apps
Cloud Computing
Microsoft Azure
Developer Tools
Cloud Services
Programming
Identity Management

Step 1.
Find the Service Principal of the Managed Identity

Header: ConsistencyLevel = eventual

Step 2: Find the Service Principal of the Microsoft Graph (or other) API
Graph API ID: 00000003-0000-0000-c000-000000000000

Step 3: Find the Application Role that will be the Permission you want to assign

Step 4: Assign Application Role to Managed Identity

Content-Type: application/json

{
"principalId": "{your-managed-identity-service-principal-id}",
"resourceId": "{your-graph-serviceprincipal-id}",
"appRoleId": "{your-app-role-id}"
}
Рекомендации по теме
Комментарии
Автор

Thank you for showing me this method. It has been immensely helpful! Great video, thank you for the effort.

AnimeCloud-sy
Автор

Can you share the link of how to do the procedure via PowerShell

JoilsonJunior-jolj
Автор

This video could have been 5 minutes long!

MattJohnston-sq