Skip to content

Commit 04447ac

Browse files
committed
Remove stray character
1 parent 20369fb commit 04447ac

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@ If you want your logic app to trigger only as a nested logic app, from the **All
202202
> [!NOTE]
203203
> Regardless of IP address, you can still run a logic app that has a request-based trigger by using
204204
> `/triggers/<trigger-name>/run` through the Azure REST API or through API Management. However, this scenario
205-
> still requires [authentication](../active-directory/develop/authentication-scenarios.md) > against the
205+
> still requires [authentication](../active-directory/develop/authentication-scenarios.md) against the
206206
> Azure REST API. All events appear in the Azure Audit Log. Make sure that you set access control policies accordingly.
207207
208208
#### Restrict inbound IP ranges in Azure Resource Manager template

0 commit comments

Comments
 (0)