You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> For Power Automate, review [Limits and configuration in Power Automate](/power-automate/limits-and-config).
15
+
> [!IMPORTANT]
16
+
>
17
+
> For Power Automate, see [Limits and configuration in Power Automate](/power-automate/limits-and-config).
16
18
17
19
This reference guide describes the limits and configuration information for Azure Logic Apps and related resources. Based on your scenario, solution requirements, the capabilities that you want, and the environment where you want to run your workflows, you choose whether to create a Consumption logic app workflow that runs in *multitenant* Azure Logic Apps or a Standard logic app workflow that runs in *single-tenant* Azure Logic Apps or an App Service Environment (v3 - Windows plans only).
18
20
@@ -614,23 +616,31 @@ Before you set up your firewall with IP addresses, review these considerations:
614
616
615
617
### Inbound IP addresses
616
618
617
-
For Azure Logic Apps to receive incoming communication through your firewall, you have to allow traffic through the inbound IP addresses described in this section for your logic app's Azure region. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md), **LogicAppsManagement**, rather than specify the Azure Logic Apps inbound IP address prefixes for each region. If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
619
+
For Azure Logic Apps to receive communication through your firewall from external services, you have to allow traffic through inbound IP addresses set aside for your logic app resource's Azure region.
620
+
621
+
To reduce complexity when you create security rules, use the [**LogicAppsManagement** service tag](../virtual-network/service-tags-overview.md), rather than specific inbound IP addresses for each Azure region. The service tag includes IP addresses that are static, so if you can't use the service tag, you can add all the IP addresses covered by the service tag.
622
+
623
+
Otherwise, see the section named [Multitenant - Inbound IP addresses](#multitenant-inbound). If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
618
624
619
625
> [!NOTE]
620
626
>
621
-
> Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control on the logic app resource,
622
-
> you must make sure that the calls from these target systems (IP addresses) have permissions to access your logic app. The following
623
-
> connectors make inbound webhook callbacks to Azure Logic Apps:
627
+
> Some managed connector operations make inbound webhook callbacks to Azure Logic Apps.
628
+
> If you use access control on the logic app resource, make sure that the calls from
629
+
> the IP addresses for these services or systems have permissions to access your logic app.
> (Common Data Service), Microsoft Forms, Microsoft Dynamics 365 Business Central, Microsoft
636
+
> Dynamics 365 for Fin & Ops, Microsoft Office 365* Outlook, Microsoft Outlook.com, Microsoft
637
+
> Sentinel, Parserr, SAP*, Shifts for Microsoft Teams, Teamwork Projects, Typeform, and so on:
631
638
>
632
-
> -**SAP**: The return caller depends on whether the deployment environment is either multitenant Azure.
633
-
> In the multitenant environment, the on-premises data gateway makes the call back to the Azure Logic Apps service.
639
+
> -**Office 365**: The return caller is actually the Office 365 connector. You can specify the
640
+
> managed connector outbound IP address for each region, or use the **AzureConnectors** service tag for these managed connectors.
641
+
>
642
+
> -**SAP**: The return caller depends on whether the deployment environment is multitenant Azure.
643
+
> In the multitenant, the on-premises data gateway makes the callback to the Azure Logic Apps service.
634
644
635
645
<aname="multitenant-inbound"></a>
636
646
@@ -703,21 +713,24 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
703
713
704
714
### Outbound IP addresses
705
715
706
-
For Azure Logic Apps to send outgoing communication through your firewall, you have to allow traffic in your logic app's Azure region for *all the outbound IP addresses*described in this section. If you're using Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
716
+
For Azure Logic Apps to send communication through your firewall, you have to allow traffic through *all the outbound IP addresses*set aside for your logic app resource's Azure region.
707
717
708
-
> [!TIP]
709
-
>
710
-
> To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md),
711
-
> **LogicApps**, rather than specify the Azure Logic Apps outbound IP address prefixes for each region. Optionally, you can also use the
712
-
> **AzureConnectors** service tag for managed connectors that make outbound calls to their respective services, such as Azure Storage or
713
-
> Azure Event Hubs, rather than specify the outbound managed connector IP address prefixes for each region. These tags work across the
714
-
> regions where Azure Logic Apps is available.
718
+
To reduce complexity when you create security rules, use the [**LogicApps** service tag](../virtual-network/service-tags-overview.md), rather than specific outbound IP addresses for each Azure region. If your workflow uses any [managed connector operations](/azure/connectors/managed) or [custom connectors](/connectors/custom-connectors), use the **AzureConnectors** service tag so that these connectors can make outbound calls to their respective services, such as Office 365 Outlook, or SQL Server. Both these tags work across the Azure regions where Azure Logic Apps is available. Service tags includes static IP addresses, so if you can't use service tags, add *all the outbound IP addresses* covered by the service tags for your Azure region.
715
719
716
-
If your workflow also uses any [managed connectors](../connectors/managed.md), such as the Office 365 Outlook connector or SQL connector, or uses any [custom connectors](/connectors/custom-connectors/), your firewall has to allow traffic in your logic app's Azure region for [*all the managed connector outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If your workflow uses custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](logic-apps-gateway-connection.md), you need to set up the gateway installation to allow access for the corresponding [*managed connector* outbound IP addresses](/connectors/common/outbound-ip-addresses#azure-logic-apps). For more information about setting up communication settings on the gateway, review these topics:
720
+
For custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](/azure/logic-apps/logic-apps-gateway-connection), you must set up the gateway installation to allow access for the corresponding [*managed* connector outbound IP addresses](/connectors/common/outbound-ip-addresses#azure-logic-apps).
721
+
722
+
For more information about setting up communication settings on the gateway, see the following articles:
717
723
718
724
*[Adjust communication settings for the on-premises data gateway](/data-integration/gateway/service-gateway-communication)
719
725
*[Configure proxy settings for the on-premises data gateway](/data-integration/gateway/service-gateway-proxy)
720
726
727
+
Otherwise, see the following sections, which list *all the outbound IP addresses that you need to add*:
728
+
729
+
-[Multitenant - Outbound IP addresses](#multitenant-outbound)
730
+
-[Managed connector outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps)
731
+
732
+
If you're using Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
733
+
721
734
<aname="multitenant-outbound"></a>
722
735
723
736
#### Multitenant - Outbound IP addresses
@@ -787,7 +800,7 @@ This section lists the outbound IP addresses that Azure Logic Apps requires in y
0 commit comments