Issue Creating Workflows in Standard Logic App Using User-Assigned Managed Identity (UAMI) .

Utkarsh Rai 20 Reputation points Microsoft Employee
2025-08-06T18:05:05.9233333+00:00

Hi Team,

I’m working on setting up a Standard Logic App and encountering issues while creating workflows. I’ve disabled the “Allow storage account key access” setting on the associated storage account and intend to authenticate using a User-Assigned Managed Identity (UAMI) or System-Assigned Managed Identity (SAMI).

Below are the configuration settings I’ve added or updated in the Logic App’s application settings:

  • AzureWebJobsStorage__blobServiceUri

AzureWebJobsStorage__credentialType (set to managedIdentity)

AzureWebJobsStorage__managedIdentityResourceId

AzureWebJobsStorage__queueServiceUri

AzureWebJobsStorage__tableServiceUri

WEBSITE_NODE_DEFAULT_VERSION

WEBSITE_VNET_ROUTE_ALL

The UAMI has been assigned the following roles on the storage account:

Storage Blob Data Contributor

Storage Queue Data Contributor

Storage Table Data Contributor

Storage Blob Data Owner

Storage Account Contributor

Despite these configurations and permissions, I’m still encountering errors when trying to create or deploy workflows.

Could someone please advise if I’m missing any required permissions or configuration steps specific to storage access via managed identities in Standard Logic Apps?

Appreciate your support and insights.

Thanks, Utkarsh RaiHi Team,

I’m working on setting up a Standard Logic App and encountering issues while creating workflows. I’ve disabled the “Allow storage account key access” setting on the associated storage account and intend to authenticate using a User-Assigned Managed Identity (UAMI) or System-Assigned Managed Identity (SAMI).

Below are the configuration settings I’ve added or updated in the Logic App’s application settings:

AzureWebJobsStorage__blobServiceUri

AzureWebJobsStorage__credentialType (set to managedIdentity)

AzureWebJobsStorage__managedIdentityResourceId

AzureWebJobsStorage__queueServiceUri

AzureWebJobsStorage__tableServiceUri

WEBSITE_NODE_DEFAULT_VERSION

WEBSITE_VNET_ROUTE_ALL

The UAMI has been assigned the following roles on the storage account:

Storage Blob Data Contributor

Storage Queue Data Contributor

Storage Table Data Contributor

Storage Blob Data Owner

Storage Account Contributor

Despite these configurations and permissions, I’m still encountering access errors when trying to create or deploy workflows.

Error - System.Private.CoreLib: Access to the path 'C:\home\data\Functions\secrets\Sentinels' is denied.

Could someone please advise if I’m missing any required permissions or configuration steps specific to storage access via managed identities in Standard Logic Apps?

Appreciate your support and insights .

Azure Logic Apps
Azure Logic Apps
An Azure service that automates the access and use of data across clouds without writing code.
{count} votes

Accepted answer
  1. Krishna Chowdary Paricharla 2,155 Reputation points Microsoft External Staff Moderator
    2025-08-11T18:03:07.9+00:00

    Hello Utkarsh Rai

    Disabling Storage Account Key Access is currently available only for Standard Logic Apps hosted within an App Service Environment v3 (ASE v3).

    • Not supported for:
      • Standard Logic Apps on the Workflow Standard Plan (outside ASE)
      • Consumption Logic Apps
    • Supported for:
      • Standard Logic Apps deployed in ASE v3

    Reason for this limitation: Logic Apps require access to an Azure Storage account for state management, runtime, and workflow persistence. In most hosting scenarios (such as Workflow Standard Plan or Consumption), storage account keys are necessary for operation. However, ASE v3 offers advanced network isolation and supports Managed Identity, which allows storage access without using account keys.

    For ASE v3 deployments:

    1. Set up a Managed Identity (either System-Assigned or User-Assigned) for your Logic App.
    2. Grant the Managed Identity the necessary Azure RBAC roles (e.g., Storage Blob Data Contributor) on the Storage Account.
    3. After confirming Managed Identity authentication, disable “Allow storage account key access” in the storage account settings.

    References:

    Hope this helps!

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.