Add certificates to integration accounts for securing messages in workflows with Azure Logic Apps
When you need to exchange confidential messages in a logic app business-to-business (B2B) workflow, you can increase the security around this communication by using certificates. A certificate is a digital document that helps secure communication in the following ways:
Checks the participants' identities in electronic communications.
Encrypts message content.
Digitally signs messages.
You can use the following certificate types in your workflows:
Public certificates, which you must purchase from a public internet certificate authority (CA). These certificates don't require any keys.
Private certificates or self-signed certificates, which you create and issue yourself. However, these certificates require private keys.
If you're new to logic apps, review What is Azure Logic Apps? For more information about B2B enterprise integration, review B2B enterprise integration workflows with Azure Logic Apps and Enterprise Integration Pack.
Prerequisites
An Azure account and subscription. If you don't have a subscription yet, sign up for a free Azure account.
An integration account resource where you define and store artifacts, such as trading partners, agreements, certificates, and so on, for use in your enterprise integration and B2B workflows. This resource has to meet the following requirements:
Is associated with the same Azure subscription as your logic app resource.
Exists in the same location or Azure region as your logic app resource.
If you use the Logic App (Consumption) resource type, you have to link your integration account to your logic app resource before you can use your artifacts in your workflow.
To create and add certificates for use in Logic App (Consumption) workflows, you don't need a logic app resource yet. However, when you're ready to use those certificates in your workflows, your logic app resource requires a linked integration account that stores those certificates.
If you're using the Logic App (Standard) resource type, your integration account doesn't need a link to your logic app resource but is still required to store other artifacts, such as partners, agreements, and certificates, along with using the AS2, X12, and EDIFACT operations. Your integration account still has to meet other requirements, such as using the same Azure subscription and existing in the same location as your logic app resource.
Note
Currently, only the Logic App (Consumption) resource type supports RosettaNet operations. The Logic App (Standard) resource type doesn't include RosettaNet operations.
For private certificates, you must meet the following prerequisites:
Add a private key in Azure Key Vault and have the Key Name. For more information, review Add your private key to Azure Key Vault.
Authorize the Azure Logic Apps service to perform operations on your key vault. To grant access to the Azure Logic Apps service principal, use the PowerShell command, Set-AzKeyVaultAccessPolicy, for example:
Set-AzKeyVaultAccessPolicy -VaultName 'TestcertKeyVault' -ServicePrincipalName '7cd684f4-8a78-49b0-91ec-6a35d38739ba' -PermissionsToKeys decrypt, sign, get, listNote
This article uses the Azure Az PowerShell module, which is the recommended PowerShell module for interacting with Azure. To get started with the Az PowerShell module, see Install Azure PowerShell. To learn how to migrate to the Az PowerShell module, see Migrate Azure PowerShell from AzureRM to Az.
Add a corresponding public certificate to your key vault. This certificate appears in your agreement's Send and Receive settings for signing and encrypting messages. For example, review Reference for AS2 messages settings in Azure Logic Apps.
At least two trading partners and an agreement between those partners in your integration account. An agreement requires a host partner and a guest partner. Also, an agreement requires that both partners use the same or compatible business identity qualifier that's appropriate for an AS2, X12, EDIFACT, or RosettaNet agreement.
Optionally, the logic app resource and workflow where you want to use the certificate. The workflow requires any trigger that starts your logic app's workflow. If you haven't created a logic app workflow before, review Quickstart: Create your first logic app.
Add a public certificate
To use a public certificate in your workflow, you have to first add the certificate to your integration account.
In the Azure portal search box, enter
integration accounts, and select Integration accounts.Under Integration accounts, select the integration account where you want to add your certificate.
On the integration account menu, under Settings, select Certificates.
On the Certificates pane, select Add.
On the Add Certificate pane, provide the following information about the certificate:
Property Required Value Description Name Yes <certificate-name> Your certificate's name, which is publicCertin this exampleCertificate Type Yes Public Your certificate's type Certificate Yes <certificate-file-name> To browse for the certificate file that you want to add, select the folder icon next to the Certificate box. 
When you're done, select OK.
After Azure validates your selection, Azure uploads your certificate.

Add a private certificate
To use a private certificate in your workflow, you have to first add the certificate to your integration account. Make sure that you've also met the prerequisites private certificates.
In the Azure portal search box, enter
integration accounts, and select Integration accounts.Under Integration accounts, select the integration account where you want to add your certificate.
On the integration account menu, under Settings, select Certificates.
On the Certificates pane, select Add.
On the Add Certificate pane, provide the following information about the certificate:
Property Required Value Description Name Yes <certificate-name> Your certificate's name, which is privateCertin this exampleCertificate Type Yes Private Your certificate's type Certificate Yes <certificate-file-name> To browse for the certificate file that you want to add, select the folder icon next to the Certificate box. In the key vault that contains your private key, the file you add there is the public certificate. Resource Group Yes <integration-account-resource-group> Your integration account's resource group, which is Integration-Account-RGin this exampleKey Vault Yes <key-vault-name> Your key vault name Key name Yes <key-name> Your key name 
When you're done, select OK.
After Azure validates your selection, Azure uploads your certificate.

Next steps
Povratne informacije
Pošalјite i prikažite povratne informacije za