Skip to content

Commit 2c72768

Browse files
author
ecfan
committed
Update firewall example
1 parent c3d7fdb commit 2c72768

File tree

1 file changed

+28
-34
lines changed

1 file changed

+28
-34
lines changed

articles/logic-apps/create-standard-workflows-visual-studio-code.md

Lines changed: 28 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
88
ms.date: 03/17/2025
9-
ms.custom: engagement-fy23, devx-track-dotnet
9+
ms.custom: devx-track-dotnet
1010
# Customer intent: As a logic apps developer, I want to create a Standard logic app workflow that runs in single-tenant Azure Logic Apps using Visual Studio Code.
1111
---
1212

@@ -769,54 +769,48 @@ Before you deploy your Standard logic app to the Azure portal, review this secti
769769

770770
### Set up firewall access
771771

772-
If your environment has strict network requirements or firewalls that limit traffic, you have to set up permissions for any connections in your workflow.
772+
If your environment has strict network requirements or firewalls that limit traffic, you have to set up permissions for any connections created by [Azure managed, hosted, and shared connectors](/azure/connectors/managed) and used in your workflow.
773773

774774
To find the fully qualified domain names (FQDNs) for these connections, follow these steps:
775775

776-
1. In your logic app project, open the **connections.json** file, and find the **`managedApiConnections`** object.
776+
1. In your logic app project, open the **local.settings.json** file.
777777

778-
The **connections.json** file is created after you add the first connection-based trigger or action to your workflow.
778+
1. For each connection that you created, find the property named **`<connection-name>-ConnectionRuntimeUrl`**, which uses the following syntax:
779779

780-
1. For each connection that you created, copy and save the **`connectionRuntimeUrl`** property value somewhere safe so that you can set up your firewall with this information.
780+
**`"<connection-name>-ConnectionRuntimeUrl": <connection-runtime-URL>`**
781781

782-
The following example **connections.json** file contains two connections, an Office 365 connection and an AS2 connection. Both use managed identities for authentication and have the following **`connectionRuntimeUrl`** values, respectively:
782+
1. Copy and save this connection property value somewhere safe so that you can set up your firewall with this information.
783783

784-
- Office 365: **`"connectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/office365/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1`**
784+
For example, suppose you have a sample **local.settings.json** file that contains these connections: an Office 365 connection and an AS2 connection. These connections use the following respective sample values for the **`<connection-name>-ConnectionRuntimeUrl`** properties:
785785

786-
- AS2: **`"connectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/as2/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2`**
786+
- Office 365: **`"office365-ConnectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/office365/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1"`**
787+
788+
- AS2: **`"as2-ConnectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/as2/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2`**
789+
790+
The sample **local.settings.json** file looks similar to the following version:
787791

788792
```json
789793
{
790-
"managedApiConnections": {
791-
"as2": {
792-
"api": {
793-
"id": "/subscriptions/<Azure-subscription-ID>/providers/Microsoft.Web/locations/<Azure-region>/managedApis/as2"
794-
},
795-
"connection": {
796-
"id": "/subscriptions/<Azure-subscription-ID>/resourceGroups/<Azure-resource-group>/providers/Microsoft.Web/connections/<connection-resource-name>"
797-
},
798-
"connectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/as2/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2,
799-
"authentication": {
800-
"type":"ManagedServiceIdentity"
801-
}
802-
},
803-
"office365": {
804-
"api": {
805-
"id": "/subscriptions/<Azure-subscription-ID>/providers/Microsoft.Web/locations/<Azure-region>/managedApis/office365"
806-
},
807-
"connection": {
808-
"id": "/subscriptions/<Azure-subscription-ID>/resourceGroups/<Azure-resource-group>/providers/Microsoft.Web/connections/<connection-resource-name>"
809-
},
810-
"connectionRuntimeUrl": https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/office365/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1,
811-
"authentication": {
812-
"type":"ManagedServiceIdentity"
813-
}
814-
}
794+
"IsEncrypted": false,
795+
"Values": {
796+
"AzureWebJobsStorage": "UseDevelopmentStorage=true",
797+
"FUNCTIONS_WORKER_RUNTIME": "node",
798+
"APP_KIND": "workflowapp",
799+
"ProjectDirectoryPath": "c:\\Users\\<local-username>\\Desktop\\Visual Studio Code projects\\Azure Logic Apps\fabrikam-workflows\\Fabrikam-Workflows\\Fabrikam-Workflows",
800+
"WORKFLOWS_TENANT_ID": "<Microsoft-Entra-tenant-ID>",
801+
"WORKFLOWS_SUBSCRIPTION_ID": "<Azure-subscription-ID>",
802+
"WORKFLOWS_RESOURCE_GROUP_NAME": "Fabrikam-Workflows-RG",
803+
"WORKFLOWS_LOCATION_NAME": "westcentralus",
804+
"WORKFLOWS_MANAGEMENT_BASE_URI": "https://management.azure.com/",
805+
"as2-connectionKey": "<connection-key>",
806+
"as2-ConnectionRuntimeUrl": "https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/as2/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2",
807+
"office365-connectionKey": "<connection-key>",
808+
"office365-ConnectionRuntimeUrl": "https://A1bC2dE3fH4iJ5kL6mN7oP8qR9sT0u.00.common.logic-<Azure-region>.azure-apihub.net/apim/office365/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1",
815809
}
816810
}
817811
```
818812

819-
1. Set up your firewall using the values that you saved. For example, see the following documentation:
813+
1. Set up your firewall using the values that you saved. For more information, see the following documentation:
820814

821815
- [Azure Firewall Manager Policy overview](/azure/firewall-manager/policy-overview)
822816
- [Deploy and configure Azure Firewall using the Azure portal - classic](/azure/firewall/tutorial-firewall-deploy-portal).

0 commit comments

Comments
 (0)