This provides sample codes how to protect Power Platform custom connectors through Azure API Management as the "transparent" proxy.
- 한국어: TBD
- English: TBD
There are two parts involved in this repository to implement the Power Platform custom connectors protected by Azure API Management.
-
Log into Azure through Azure CLI.
# Login to Azure az login # Login to Azure within GitHub Codespaces az login --use-device-code
-
Log into GitHub through GitHub CLI.
gh auth login
-
Log into Azure Dev CLI.
# Login to Azure azd login # Login to Azure within GitHub Codespaces azd login --use-device-code
-
Run the following command to configure Azure Dev CLI environment. It will ask you to enter all necessary information.
azd init
- Choose
Empty Template
. - Enter the environment name that represents your resource name on Azure.
- Choose your Azure subscription.
- Choose your Azure resource location.
- Choose
-
Run the following command to configure Azure Dev CLI with GitHub Actions CI/CD pipeline. At the end of configuration, DO NOT COMMIT AND PUSH the local changes FOR NOW.
azd pipeline config
-
Overwrite
azure.yaml
withazure.sample.yaml
. Then replace all{{AZURE_ENV_NAME}}
with your actual environment name. -
Open
.azure/{{AZURE_ENV_NAME}}/.env
and add the following three lines. Make sure you replace{{GITHUB_PERSONAL_ACCESS_TOKEN}}
and{{GITHUB_USERNAME}}
with yours, respectively:GITHUB_REPOSITORY_NAME="power-platform-connector-via-apim" GITHUB_TOKEN="{{GITHUB_PERSONAL_ACCESS_TOKEN}}" GITHUB_USERNAME="{{GITHUB_USERNAME}}"
-
Run the following command to provision and deploy the apps.
azd provision
Power Platform custom connector currently supports three authentication/authorisation methods – API Key Auth, Basic Auth and OAuth2 Authorisation Code Auth. To apply each method, read the following documents:
- API Key Auth
- Basic Auth
- OAuth2 – Authorisation Code Auth
- BFF – Combination of API Key Auth & Basic Auth
If you find any issue while using this repository, please create an issue on the issue page.