Easy Auth | Standard Logic App with Azure API Management

GitHub Repository

Overview

The recent work that I have been doing with Standard Logic Apps and linking them as backends to Azure API Management has relied on the use of the Logic App Workflow SAS key for security. This is a valid authentication approach, but there are risks that you need to be aware of as well as best practices that you need to be abiding by. Such as:

  • Some Potential Risks:

    • If a SAS is leaked, it can be used by anyone who obtains it to call your Logic App Workflow.
    • If a SAS expires and the API Management API has not been updated to make use of the updated SAS, then the integration functionality will be hindered.
  • Some SAS Best Practices to mitigate risks:

    • Always use HTTPS - If a SAS is passed over HTTP and intercepted, an attacker can perform a man-in-the-middle attack and read the SAS.
    • Have a revocation plan - Make sure that you are prepared to respond if a SAS is compromised.
    • Have a rotation plan - Look to replace the SAS with new ones at regular intervals and include shorter time intervals for the expiration period.

There are other features that can be used to further restrict access to your Logic App, for instance adding IP Address Restrictions to limit traffic to only your API Management Instance.

But what if you require further governance whereby the Logic App requires a valid Entra ID bearer token in order to be invoked. To implement this we need to make use of Easy Auth.

Easy Auth

Easy Auth is a built-in authentication and authorisation capability provided by Azure App Services and Azure Functions. Easy Auth makes use of federated identity whereby a third-party identity provider manages the user identities and authentication flow for you. Fortunately for us, Standard Logic Apps have the same foundations as Azure Functions and therefore Easy Auth is also extended to Logic Apps Standard.

Eay Auth

Easy Auth is a platform feature running on the same virtual machine as your application. Once enabled, any incoming HTTP requests will pass through this feature prior to being handled by your application. Easy Auth runs separately from your application code and can be configured using ARM settings or using a configuration file.

Using Easy Auth and Linking to API Management

As mentioned above, I would like to use Easy Auth to protect my HTTP Triggered Azure Logic App (Standard) workflows, but more importantly, I would like Azure API Management to be the only identity that can be used to make requests to my workflows as shown in the diagram below:

Eay Auth

Note:

As we will be invoking the Logic App HTTP triggered workflows with Easy Auth, we no longer need to specify the following parameters in the request:

  • sp: The permissions; generally ‘read’ or ‘write’
  • sv: The version number of the query parameters
  • sig: Shared-Access-Signature

Furthermore, I have opted for Infrastructure as Code (IaC) as my method of implementation, specifically Bicep.

For setup, we will need to conduct the following four steps:

  1. Make sure that API Management has been setup with Managed Identity. I am using System Assigned.

    @description('Deployment of the APIM instance')
    resource apimInstanceDeploy 'Microsoft.ApiManagement/service@2022-08-01' = {
      ...
      identity: {
        type: 'SystemAssigned'
      }
      ...
    }
    
  2. Enable Easy Auth on the Standard Logic App using ARM/Bicep Template AuthSettingsV2 or ARM REST API. I am using a Bicep Template.

    @description('Setup the Easy Auth config settings for the Standard Logic App')
    resource applicationAuthSettings 'Microsoft.Web/sites/config@2023-01-01' = {
      name: 'authsettingsV2'
      parent: applicationLogicAppStandardDeploy // Existing Standard Logic App for Easy Auth to be enabled
      properties: {
        globalValidation: {
          requireAuthentication: true
          unauthenticatedClientAction: 'AllowAnonymous' // Do not change: See note below.
        }
        httpSettings: {
          requireHttps: true
          routes: {
            apiPrefix: '/.auth'
          }
          forwardProxy: {
            convention: 'NoProxy'
          }
        }
        identityProviders: {
          azureActiveDirectory: {
            enabled: true
            registration: {
              openIdIssuer: uri('https://sts.windows.net/', tenant().tenantId)
              clientId: apimInstance.identity.principalId // APIM System Assigned Principal Id
            }
            validation: {
              allowedAudiences: environment().authentication.audiences // Azure Management Plane [management.core.windows.net and management.azure.com]
              defaultAuthorizationPolicy: {
                allowedPrincipals: {
                  identities: [
                    apimInstance.identity.principalId // APIM System Assigned Principal Id
                  ]
                }
              }
            }
          }
        }
        platform: {
          enabled: true
          runtimeVersion: '~1'
        }
      }
    }
    

    Note:

    1EasyAuth is managed by AppService, and for an incoming request, it is a hop that comes before LA Runtime. When EasyAuth is enabled for a Logicapp standard, all incoming requests are validated against the policies in your V2 Auth settings.

    If you have “unauthenticatedClientAction”: “Return401” and when the request fails with EasyAuth, those requests are not routed to LA runtime and will fail with 401 from AppService. Therefore, you will also observe broken portal experience with Return401. When you set it to “AllowAnonymous”, all calls (failed and successful) will be routed to the LA runtime. The LA runtime will know if the request failed with EasyAuth or was successful and will process the request accordingly. For example, to get run histories, we authenticate it on SAS specific to that run generated based on the Logic Apps access keys. LA runtime will know that this request failed with EasyAuth but it will be processed successfully as it has valid SAS. The underlying AppService platform will have no knowledge of validating other auth like SAS.

  3. Configure API Management to obtain a valid Bearer token and add it to the request Authorization Header. Implemented through APIM Policy.

    <!-- API ALL OPERATIONS SCOPE -->
    <policies>
        <inbound>
            <base />
            <!-- Uses System Assigned Managed Identity of the APIM Instance -->
              <authentication-managed-identity resource="https://management.azure.com/" output-token-variable-name="msi-access-token" ignore-error="false" />
              <set-header name="Authorization" exists-action="override">
     	         <value>@("Bearer " + (string)context.Variables["msi-access-token"])</value>
              </set-header>
        </inbound>
        <backend>
            <base />
        </backend>
        <outbound>
            <base />
        </outbound>
        <on-error>
            <base />
        </on-error>
    </policies>
    
  4. Configure API Management to Append the Logic App Workflow api-version query parameter to the request. Implemented through APIM Policy.

    <!-- API OPERATION SCOPE -->
    <policies>
        <inbound>
            <base />
            <rewrite-uri template="__uri__" />
            <set-query-parameter name="api-version" exists-action="append">
                <value>__api-version__</value>
            </set-query-parameter>
        </inbound>
        <backend>
            <base />
        </backend>
        <outbound>
            <base />
        </outbound>
        <on-error>
            <base />
        </on-error>
    </policies>
    

Summary

In short, we have defined our three A’s (Access, Authentication, Authorisation) providing further governance on our Standard Logic App and API Management through the use of Easy Auth. To see my worked example, have a look at my GitHub repository along with a README that explains how to get started.

For the original version of this post see Andrew Wilson's personal blog at Easy Auth | Standard Logic App with Azure API Management