feat: Add user-assigned managed identity picker to MCP client#8981
Conversation
🤖 AI PR Validation ReportPR Review ResultsThank you for your submission! Here's detailed feedback on your PR title and body compliance:✅ PR Title
✅ Commit Type
✅ Risk Level
✅ What & Why
✅ Impact of Change
✅ Test Plan
|
| Section | Status | Recommendation |
|---|---|---|
| Title | ✅ | Optional: add scope in commit prefix if desired |
| Commit Type | ✅ | No changes needed |
| Risk Level | ✅ | Matches labels and change scope |
| What & Why | ✅ | No changes needed |
| Impact of Change | ✅ | Optional: list exact files changed |
| Test Plan | ✅ | Unit tests present; E2E optional |
| Contributors | Add contributors if others were involved | |
| Screenshots/Videos | ✅ | No changes needed |
Final message:
All required PR body sections are present and consistent with the code diff. Labels include risk:low, which matches my advised risk level of Low. Unit tests referenced in the PR are present in the changeset. No blocking issues found in the PR title or body — this is ready from a PR-title/body perspective.
Optional suggestions to improve clarity before merge:
- (Optional) Tweak the title to include a scope token (e.g.,
feat(mcpclient): ...) if you want stricter conventional commit scoping. - (Optional) Add a short bullet in Impact or What & Why listing the specific manifest files changed (for easier reviewer reference).
- (Optional) If others contributed (PMs/designers/reviewers), list them in Contributors to give credit.
Please update only if you want to incorporate the optional clarifications above. Otherwise, this PR passes the PR title/body checklist. Thank you!
Last updated: Mon, 30 Mar 2026 19:55:00 GMT
There was a problem hiding this comment.
Pull request overview
Adds user-assigned managed identity selection support for MCP client managed identity authentication, and updates the Standalone (Consumption) harness to surface workflow identity so the identity picker can populate correctly.
Changes:
- Adds an
identityparameter using theidentitypickereditor to MCP client connector manifests (Standard + Consumption). - Updates Standalone Consumption designer/template services to return the app’s managed identity from the workflow-and-artifacts ARM response.
- Minor import re-organization in the Standalone templates consumption entry.
Reviewed changes
Copilot reviewed 5 out of 5 changed files in this pull request and generated 3 comments.
Show a summary per file
| File | Description |
|---|---|
| libs/logic-apps-shared/src/designer-client-services/lib/standard/manifest/mcpclientconnector.ts | Adds identity connection parameter to the MCP client ManagedServiceIdentity parameter set (Standard manifest). |
| libs/logic-apps-shared/src/designer-client-services/lib/consumption/manifests/mcpclientconnector.ts | Adds identity connection parameter to the MCP client ManagedServiceIdentity parameter set (Consumption manifest). |
| apps/Standalone/src/templates/app/TemplatesConsumption.tsx | Attempts to switch Consumption template harness identity source to the ARM workflow-and-artifacts response. |
| apps/Standalone/src/designer/app/AzureLogicAppsDesigner/laDesignerConsumptionV2.tsx | Switches Consumption designer service identity source to workflowAndArtifactsData.identity. |
| apps/Standalone/src/designer/app/AzureLogicAppsDesigner/laDesignerConsumption.tsx | Switches Consumption designer service identity source to workflowAndArtifactsData.identity. |
958443b to
266ca27
Compare
266ca27 to
938b9ce
Compare
…entity auth
Commit Type
Risk Level
What & Why
Adds a user-assigned managed identity picker to the MCP client connector's Managed Service Identity authentication option. Previously, selecting "Managed identity" auth for an MCP server connection only used system-assigned MI with no UI to choose a specific identity. This change adds the same identity selection dropdown used by HTTP and other connectors, enabling users to select a user-assigned managed identity.
Also fixes a pre-existing bug in the Standalone test harness where getDataForConsumption() was stripping the identity field from the ARM response, causing the identity picker to show "No identities available" for consumption workflows. The portal extension does not have this bug.
Impact of Change
Test Plan
Standard Logic App (live Azure) — both system-assigned and user-assigned MI visible
Consumption Logic App (live Azure) — both system-assigned and user-assigned MI visible
E2E: successfully created MCP connection with user-assigned MI against OAuth-protected MCP server (DivyaMCPApp)
Contributors
None
Screenshots/Videos