Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Logic Apps Standard + Dataverse template #165

Open
wants to merge 3 commits into
base: main
Choose a base branch
from

Conversation

rajyraman
Copy link

@rajyraman rajyraman commented Jun 21, 2023

Add a new template that shows the following

  1. Creating Logic Apps Standard resource with VNet and Service Endpoints to communicate with Storage Account
  2. Creating Service Connections to Dataverse using App Registration and giving Logic Apps's Managed Identity access to the Dataverse Connection
  3. Using Easy Auth to lock down Logic Apps to use OAuth2 token

@hemarina
Copy link
Contributor

@v-xuto Would you test this template when you get a chance?
@jongio Would you take a review on this template?

@v-xuto
Copy link
Member

v-xuto commented Jul 25, 2023

@v-xuto Would you test this template when you get a chance?

Sure. We will start testing this template today.

@v-jiaodi
Copy link
Member

v-jiaodi commented Jul 28, 2023

@rajyraman, I encountered two issues when test this template. Can you help me take a look?

  1. When executing pac auth create -env https://environment.crm.dynamics.com on CodeSpace, the error is as follows:

image

  1. When executing pac admin create-service-principal in Windows desktop , the error is as follows:

image

@rajyraman
Copy link
Author

rajyraman commented Jul 28, 2023

@v-jiaodi - Please see 3:30 and 5:58 in this video (https://www.youtube.com/watch?v=BjI4OlNKfh4) where I walk through this repo. 2 does not work for me as well. So, I just downgraded to the older version. See microsoft/powerplatform-build-tools#408
This message looks like you don't have permissions to create App Registration on the tenant.

1 looks like there is some conditional access/Intune to block signins for untrusted devices using Microsoft account. You can probably try with a M365 Developer program dataverse environment with a non-Microsoft account.

@zedy-wj
Copy link
Member

zedy-wj commented Aug 1, 2023

1 looks like there is some conditional access/Intune to block signins for untrusted devices using Microsoft account. You can probably try with a M365 Developer program dataverse environment with a non-Microsoft account.

@rajyraman - we try to test with these values and its okay:
image

Could you provide a non-Microsoft account for us to test pac auth create -env https://environment.crm.dynamics.com?

@savannahostrowski savannahostrowski removed their request for review August 3, 2023 17:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants