How to delete Integration Account for Logic App - azure-logic-apps

Where can I find some information regarding how to delete or remove Integration Account for Logic App? If I remove all my Logic App, does it automatically removes the Logic App Integration account service?

No, the Integration Account is a separate Resource from all Logic Apps.
To delete an Integration Account, you select the Integration Account, then press Delete in the button banner near the top.

Integration account is a separate component. you can link/unlink it to your logic app in Azure portal. just open your logic app instance, click Settings\Workflow settings\Integration account to find the itegration account instance.
If you want to delete the integration account, just find it under integration Account category.

Related

Is it possible to log which AD user called a Logic App workflow?

Our current Proof of Concept makes use of Azure Logic Apps workflows to perform calculations and returns this result. Our client would like to monitor when and by who theseworkflows are called/triggered. Is this possible to do in Azure Monitor/Log Analytics/Application Insights?
From my own research it seems that the above Azure resources are only able to register when triggers happend with further diagnostics, but not which AD user triggered the action.
Any advice or knowledge sharing would be greatly appreciated!
Standard Azure Activity log contains information about who triggered the manual Logic App run. You can check it in the 'Activity log' section in the Azure portal. Here is how the typical event looks like for manual trigger activated by user in the Azure portal:
If you go into details of the event you will see the full JSON object containing information about the user, IP address from which user was logged and more. These activity logs can be forwarded to Log Analytics workspace for extended storage and analytics.
1: To Know when the logic app triggered, integrate the log analytics to Azure Logic App and follow the below process:-
we have enabled log analytics workspace while creating logic app.
Run logic app twice.
Added diagnostic setting in logic app as shown below.
Once added, go to Diagnostics in logic app.
You can view when the logic app was called using report below:
Reference link
2: To know who the users is/are accessed the logic app, integrate the app insights to Azure Logic App:-
Using application insights also we can view report for logic app.
If you are calling logic app through angular or any UI, you can configure app insights in code. In this way we can get details of user who run the logic app.

Link MS Teams Bot to Azure AD app when creating chatbot in app studio

In the organization where I am trying to deploy a chatbot in MS Teams, because of security posture and separation of responsibilities, the MS Teams' admin team (different from bot developers), cannot create a new Azure AD app when creating a bot in App Studio. The authorization to create Azure AD app is only with AAD team.
To work with this process, we requested and got an application created in AAD via AAD Team. After creation of AAD app, the AAD team also gave us application name, application id and object id ;
Now, the MS Teams' admin team is asking for process/documentation to link chatbot to be created in app studio to AAD app. Can someone share these instructions or point to any existing ones ? (I couldn't find any in my searches).
The short answer is that this needs to go into the "botId" section in the Teams app manifest (see here for refence: https://learn.microsoft.com/en-us/microsoftteams/platform/resources/schema/manifest-schema). Longer answers:
You might not be editing a manifest directly - you are doing it in App Studio, so just go to the Bot section and that's where you capture the Bot ID
It sounds like there is a missing piece in what you are trying to do. You need:
a. an Azure Application (got)
b. a Teams app where you can capture the Azure App ID as bot id (got)
c. a 'Bot' registration in Azure (it's a kind of Azure resource) - have you got this already? If not, someone with Azure access will need to create it.
There is a section in the wizard to use an existing Azure Application - you'd need to select that and enter the Azure application id.
Here's more info on doing the bot registration: https://learn.microsoft.com/en-us/azure/bot-service/abs-quickstart?view=azure-bot-service-4.0&tabs=userassigned. For the screenshot in section 6, I recommend choosing "Multi-tenant" as the app type (then you can skip the 'Bot identity information' section later), and for 'Creation Type' is where you want to link to the already-created Azure Application.
Also note the "pricing tier" - by default it's on "standard", but you can change to the "free" tier to see if that's sufficient for you - your bot needs to be handling a lot of message to need to move up to the paid tier.
What I did end up doing was:
Create an app registration in azure with a secret. The secret becomes bot password in teams.
Create a bot using https://dev.botframework.com/bots. Since my app/bot is single tenant, I needed to be able to create a bot without azure service which requires subscription. I enabled Teams for this bot, besides web chat which is enabled by default.
Create an app using app studio, referencing the azure app and bot from botframework.

How do I turn on provisioning for our Enterprise application in azure AD without being in the gallery?

I created an Application Registration on our Azure AD.
I then use the application registration id to create "Enterprise Application" in our customers' AD's.
It goes like this
Their admin sign into our system and clicks connect AD
We send a challenge (OpenId Connect) that allows them to sign into their microsoft account.
This creates our application under "Enterprise Applications" in their AD and it then workes fine with SSO
So far so good. But now we want to add the next logical step with Provisioning with Scim v2 however if I on a customer/test AD browse to our app under Enterprise Application and then click Provisioning I see the following
There is no way to hook up provisioning no matter if I support Scim2 as required.
Why is this? Does our app need to be in the gallery for this to work?
I noticed I can go to Enterprise Applications > New application > Non-gallery application and create a new application. This will then work with provisioning.
But then our customers would need two apps, one from our app registration that does SSO and one more for provisioning. I would like one app to do both.
Your app needs to be in the gallery to have provisioning enabled. Barring that, the only other option is what you've already described - a custom non-gallery app.
To get your app in the gallery, https://learn.microsoft.com/en-us/azure/active-directory/develop/v2-howto-app-gallery-listing

How do I include role in event grid authentication webhook Azure Acitve Directory?

I am trying to set up an authenticated webhook call from an Azure Event Grid Domain subscription to a web app service in the same tenant. I am able to do everything up to a certain point which is that I am trying to tie the authentication to a specific app role in the subscribing app. Currently, the authentication works, but I cannot seem to figure out how to include a specific role in the token that gets sent to the subscribing endpoint. It may be that it's more of a generic question on setting up an enterprise app registration (which event grid uses) with a configurable role for app registrations. My issue is that I know how to do it when there's an app registration, but in this case I only have an enterprise app.
I have followed the documentation, and this article seems to try to do the same thing, but I don't want to do it in powershell as we have an Identity-responsible who is going to do the actual work as well as me wanting to understand what happens behind the scenes.
https://learn.microsoft.com/en-us/azure/event-grid/secure-webhook-delivery
Does anybody know how to set up the event grid webhook authentication so it includes a specific role (most probably an app role defined in the manifest of the subscribing app's app registration)?
You are following correct way of configuring event subscription.
The role which you wants to add in application can be done as below -
Azure Portal>>All Services>>Subscription>>Select Subscription>>IAM Role>>Add Role assignment>>1.Select the role which he need 2. Assign access to Azure AD user or Service Principal 3. Select the application >> Save.
or
If need to assign some customise role you can create the custom role as below -
https://learn.microsoft.com/bs-cyrl-ba/azure/role-based-access-control/custom-roles?toc=%2Fazure%2Fvirtual-network%2Ftoc.json
Azure Active Directory to secure the connection between your Event Subscription and your webhook endpoint.
https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/event-grid/secure-webhook-delivery.md

How to create Azure AD application with the Graph API with portal experience

In the new Azure portal I can create a new application registration. I have found out that this action consists of multiple steps which I want to achieve with the Graph API.
This is the portal experience which I want to simulate with the Graph API:
In the App registrations blade I press on the Add+ link to create the
registration Test App A.
I click on Test App A and the blade for this app registration opens.
In this blade the value for Managed Application In Local Directory
is a link named Test App A.
I click on that link and a new Enterprise Application - PREVIEW
blade for Test App A opens. On that blade the Delete link is enabled
and clickable. On that blade under MANAGE the link
Conditional access is present.
I close all blades and open the Enterprise applications blade. There
under MANAGE I click on All applications.
On the Enterprise applications - All applications view I see Test
App A listed.
This is what I am doing with the Graph API:
I send a POST request to https://graph.windows.net/{tenant}/applications?api-version=1.6 to create the Test App A.
I click on Test App A and the blade for this app registration opens.
In this blade the value for Managed Application In Local Directory
is the text Log on to the app to create a local instance.
I send a POST request to https://graph.windows.net/{tenant)/servicePrincipals?api-version=1.6 to create a service principal. The JSON body of the request contains only the property appId with the application ID of the Test App A as its value. This changes the value for Managed Application In Local Directory into a link named Test App A.
I click on that link and a new Enterprise Application - PREVIEW
blade for Test App A opens. On that blade the Delete link is disabled
and not clickable. On that blade under MANAGE the link
Conditional access is missing.
I close all blades and open the Enterprise applications blade. There
under MANAGE I click on All applications.
On the Enterprise applications - All applications view the application Test
App A is not listed.
What am I missing? Which properties else do I have to send in step 3. What I have to do else?
You must specify the following during the creation of the Service principal:
"tags": [
"WindowsAzureActiveDirectoryIntegratedApp"
]
Or you can update the existing service principal with that. Otherwise what you did is correct.
So service principal creation JSON would look like:
{
"appId": "0e5836bf-ac8d-4b46-9cbb-5b3e8ebcdd37",
"tags":[
"WindowsAzureActiveDirectoryIntegratedApp"
]
}
Or you could do a PATCH on the service principal with:
{
"tags":[
"WindowsAzureActiveDirectoryIntegratedApp"
]
}
About the tag
It seems when you add this tag, the principal becomes visible in the "Enterprise Applications" list (which really is the Service Principal list). Conditional Access is also enabled.
This tag seems to exist on any and all service principals created for apps through any of the Portals.
There are also service principals without the tag though, such as the principal for the Graph API, and the Azure Portal.
The point seems to be that these are services with some access in your directory, but they are not supposed to be under your control. The tag differentiates the principals that should be visible for you. Even without the tag the principal can be visible, but only via the app you created, as we saw here.
Interestingly those principals like the Microsoft Graph API have an appId, but no appOwnerTenantId. The publisherName is also null.
This is mostly just guessing since I don't actually work at Microsoft, but the bottom line seems to be that if you want AAD to handle the principal as if you created it for the app through the portal, you must specify that tag also.

Resources