Share via

enable Authentication in Logic APP

Arunpandiyan Sampath 0 Reputation points
2025-09-11T12:05:11.6766667+00:00

enable Authentication in Logic APP

Hi All,

I have created the logic App flow with 'HTTP request is received action' and tried to trigger the API call from Postman. this works fine without any authentication as the URL has SIG

However, i would like to enable authentication with OAuth. So used APP Registration to created the secret key, application ID.

I do not have the steps to enable authentication in Logic App as i am a beginner.

Can anyone suggest me the steps to enable the secure authentication in Logic App.

Azure Logic Apps
Azure Logic Apps

An Azure service that automates the access and use of data across clouds without writing code.

0 comments No comments

1 answer

Sort by: Most helpful
  1. Alex Burlachenko 21,225 Reputation points MVP Volunteer Moderator
    2025-09-12T09:48:09.37+00:00

    hi,

    that is a fantastic question. moving from that shared access signature sig) to proper oauth is a huge step up for security. great call.

    you need to enable azure active directory authentication on your http trigger. it is not enabled by default when you use the built in sig. here is how you do it step by step.

    open your logic app in the designer. click on the 'http request' trigger to open its settings. look for the 'authentication' section and click to expand it. toggle the 'add azure active directory authorization' option to on. this reveals the settings you need.

    now, you need to fill in the details from your app registration. the 'audience' field is super important. this should be the application id uri from your app registration in entra id. it usually looks like api://your-app-id. also, you need to specify the 'tenant id' where your app is registered. our docs here explain it well https://learn.microsoft.com/azure/logic-apps/logic-apps-securing-a-logic-app

    also, check this. in your app registration, you need to make sure you have configured the right permissions. for your logic app to accept tokens, the app registration needs to have the user_impersonation permission exposed. this might help in other tools too when dealing with oauth.

    now, to test from postman, you cannot just use the trigger url anymore. you need to get an access token first. in postman, go to the authorization tab for your request. select 'oauth 2.0' as the type. then, fill in the details.

    token url: https://login.microsoftonline.com/{tenant-id}/oauth2/v2.0/token

    client id: your application id

    client secret: the secret you created

    scope: api://your-app-id/.default

    grant type should be client credentials. click 'get new access token' and then use that token in your request header.

    aha, and one more thing. after you enable aad auth, the original sig url will stop working. this is a good thing. it means your api is now locked down to only requests with a valid token.

    good luck. this setup is a bit detailed, but it makes your logic app so much more secure. you are doing the right thing. let me know if you hit any snags.

    Best regards,

    Alex

    and "yes" if you would follow me at Q&A - personaly thx.
    P.S. If my answer help to you, please Accept my answer
    

    https://ctrlaltdel.blog/

    Was this answer helpful?


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.