This is a sample repo to demonstrate how to use Azure Functions System Assigned Managed Identity to connect to Power Apps WebAPI - without any password, secret or certificate.
Click this button to deploy Storage Account, App Insights and Function App resources to your Azure tenant.
The Function App assembly/code has to be deployed from your local machine by running deploy-function.ps1 and providing the following parameters.
Name | Mandatory | Description | Default |
---|---|---|---|
functionAppName | No | Name of the currently deployed Function App | |
environmentUrl | Yes | URL of your Power Apps Environment e.g. https://org.crm.dynamics.com | |
createApplicationUser | No | Create the Managed Identity of the Function App as an Application User in the Power Apps Environment | $false |
You also do it all in once (create Azure resources and deploy the Function App code) by running run.ps1 and providing the following parameters
Name | Mandatory | Description | Default |
---|---|---|---|
resourceGroup | No | Name of the new Resource Group where you would like the resources deployed to | rgazfunc |
location | No | Azure location where you would like the Resource Group to be created in | australiasoutheast |
environmentUrl | Yes | URL of your Power Apps Environment e.g. https://org.crm.dynamics.com | |
createApplicationUser | No | Create the Managed Identity of the Function App as an Application User in the Power Apps Environment | $false |
The created Application User needs to have the right security roles assigned, so that operations in the Function App that leverage Power Apps WebAPI can be performed.