Issue Creating Workflows in Standard Logic App Using User-Assigned Managed Identity (UAMI) .

Utkarsh Rai 0 Reputation points Microsoft Employee
2025-08-06T18:05:05.9233333+00:00

Hi Team,

I’m working on setting up a Standard Logic App and encountering issues while creating workflows. I’ve disabled the “Allow storage account key access” setting on the associated storage account and intend to authenticate using a User-Assigned Managed Identity (UAMI) or System-Assigned Managed Identity (SAMI).

Below are the configuration settings I’ve added or updated in the Logic App’s application settings:

  • AzureWebJobsStorage__blobServiceUri

AzureWebJobsStorage__credentialType (set to managedIdentity)

AzureWebJobsStorage__managedIdentityResourceId

AzureWebJobsStorage__queueServiceUri

AzureWebJobsStorage__tableServiceUri

WEBSITE_NODE_DEFAULT_VERSION

WEBSITE_VNET_ROUTE_ALL

The UAMI has been assigned the following roles on the storage account:

Storage Blob Data Contributor

Storage Queue Data Contributor

Storage Table Data Contributor

Storage Blob Data Owner

Storage Account Contributor

Despite these configurations and permissions, I’m still encountering errors when trying to create or deploy workflows.

Could someone please advise if I’m missing any required permissions or configuration steps specific to storage access via managed identities in Standard Logic Apps?

Appreciate your support and insights.

Thanks, Utkarsh RaiHi Team,

I’m working on setting up a Standard Logic App and encountering issues while creating workflows. I’ve disabled the “Allow storage account key access” setting on the associated storage account and intend to authenticate using a User-Assigned Managed Identity (UAMI) or System-Assigned Managed Identity (SAMI).

Below are the configuration settings I’ve added or updated in the Logic App’s application settings:

AzureWebJobsStorage__blobServiceUri

AzureWebJobsStorage__credentialType (set to managedIdentity)

AzureWebJobsStorage__managedIdentityResourceId

AzureWebJobsStorage__queueServiceUri

AzureWebJobsStorage__tableServiceUri

WEBSITE_NODE_DEFAULT_VERSION

WEBSITE_VNET_ROUTE_ALL

The UAMI has been assigned the following roles on the storage account:

Storage Blob Data Contributor

Storage Queue Data Contributor

Storage Table Data Contributor

Storage Blob Data Owner

Storage Account Contributor

Despite these configurations and permissions, I’m still encountering access errors when trying to create or deploy workflows.

Error - System.Private.CoreLib: Access to the path 'C:\home\data\Functions\secrets\Sentinels' is denied.

Could someone please advise if I’m missing any required permissions or configuration steps specific to storage access via managed identities in Standard Logic Apps?

Appreciate your support and insights .

Azure Logic Apps
Azure Logic Apps
An Azure service that automates the access and use of data across clouds without writing code.
{count} votes

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.