Using Managed Identity in Visual Studio Code for Connection to Service Bus in Azure Logic App Standard - Stack Overflow

I'm trying to use VS Code for developing a logic app that uses service bus trigger. When creating

I'm trying to use VS Code for developing a logic app that uses service bus trigger. When creating the connection can we use Managed identity in local that would use my creds similar to the Default Credentials using my token in case of Visual Studio in case of Azure Functions? I've contributor access on the service bus but still getting an error on VS Code.

This is Standard Logic app extension that I've used and want to develop the Single tenant Std Logic App

I'm trying to use VS Code for developing a logic app that uses service bus trigger. When creating the connection can we use Managed identity in local that would use my creds similar to the Default Credentials using my token in case of Visual Studio in case of Azure Functions? I've contributor access on the service bus but still getting an error on VS Code.

This is Standard Logic app extension that I've used and want to develop the Single tenant Std Logic App

Share Improve this question asked Mar 11 at 16:47 aravindaravind 151 silver badge4 bronze badges 1
  • Logic Apps do not support using Managed Identity locally the same way Azure Functions do with DefaultAzureCredential. – Aslesha Kantamsetti Commented Mar 12 at 6:02
Add a comment  | 

1 Answer 1

Reset to default 0

Using Managed Identity in Visual Studio Code for Connection to Service Bus in Azure Logic App Standard

Logic Apps do not support using Managed Identity locally the same way Azure Functions do with DefaultAzureCredential.

Thanks @ARINCO for his clear explanation.

The Visual Studio Code extension only supports Connection String or Azure AD OAuth authentication for Logic Apps. However, after deploying to Azure, we can use Managed Identity for connecting Service Bus.

To manage authentication both locally and Azure for connecting logic app to Azure Service bus use parameters.json or connection.json file to parameterize your app so that the app uses connection string for auth locally and then have Managed Identity After deploying to Azure.

For local development, set AzureWebJobsServiceBus in local.settings.json with a Service Bus connection string.

local.settings.json:


{
  "IsEncrypted": false,
  "Values": {
    "AzureWebJobsStorage": "UseDevelopmentStorage=true",
    "AzureWebJobsServiceBus": "Endpoint=sb://your-servicebus.servicebus.windows/;SharedAccessKeyName=RootManageSharedAccessKey;SharedAccessKey=your-key"
  }
}

Refer this MS Doc for Managed Identity After Deployment.

发布者:admin,转转请注明出处:http://www.yc00.com/questions/1744781505a4593370.html

相关推荐

发表回复

评论列表(0条)

  • 暂无评论

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信