Not sure if others have encountered this issue but I found that it was caused by the account used not having permissions to execute stored procedures rather than an issue with the Logic Apps Connector.
We have started working on this feature and hope to have another update by Oct 2018.
We currently have a private preview for custom policies, you can see the documentation here: https://github.com/Azure-Samples/active-directory-b2c-console-custom-policy-api
You can request private preview access by sending an email to firstname.lastname@example.org with your directory name.
We will be following up with other scenarios for programmatic APIs.
This feature is temporarily put on the backlog. Work will resume in the 4th quarter of 2018, so a public preview should be available by the end of 2018.
This is planned for the next 6 months.
That sounds more like end of 2018!
Any update on when this will be ready apart from "middle of 2018"?
Thank you for your suggestion. We understand it is super important to whitelist specific IP list for ADF as part of firewall rules and avoid opening network access to all. We are working on this with high priority. Once this is ready, we will also add ADF to the list of “Trusted Azure service” for Azure Storage and Azure SQL DB/DW.
This is something we’re looking to enable.Kevin McDonnell shared this idea ·
We definitely recognize the popularity of this feature, and we discuss it constantly during the planning phases. However there are certain technical limitations in the system that add a large amount of development cost. Because of the cost and the fact that there is a workaround available, other features get prioritized over this one.
That being said, please keep voting for it. The popularity of the feature does help bring it up and makes us reconsider every time.
Apologies for the delay.
We’re doing some research both on the specifics of this ask as well as what it would take to support this.
Is the ask here to do the same thing that regular Azure AD does (see: https://blogs.technet.microsoft.com/enterprisemobility/2014/12/18/azure-active-directory-now-with-group-claims-and-application-roles/) or is are there different requirements around this for Azure AD B2C?