You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -278,9 +278,9 @@ To control access to the inputs and outputs in your logic app's run history, you
278
278
279
279
This option helps you secure access to run history based on the requests from a specific IP address range.
280
280
281
-
*[Hide data from run history by using obfuscation](#obfuscate).
281
+
*[Secure data in run history by using obfuscation](#obfuscate).
282
282
283
-
In many triggers and actions, you can hide their inputs, outputs, or both from a logic app's run history.
283
+
In many triggers and actions, you can secure the inputs, outputs, or both in a logic app's run history.
284
284
285
285
<aname="restrict-ip"></a>
286
286
@@ -343,11 +343,11 @@ If you [automate deployment for logic apps by using Resource Manager templates](
343
343
344
344
<aname="obfuscate"></a>
345
345
346
-
### Hide data from run history by using obfuscation
346
+
### Secure data in run history by using obfuscation
347
347
348
-
Many triggers and actions have settings to hide inputs, outputs, or both from a logic app's run history. Before using these settings to help you secure this data, [review these considerations](#obfuscation-considerations).
348
+
Many triggers and actions have settings to secure inputs, outputs, or both from a logic app's run history. Before using these settings to help you secure this data, [review these considerations](#obfuscation-considerations).
349
349
350
-
#### Hide inputs and outputs in the designer
350
+
#### Secure inputs and outputs in the designer
351
351
352
352
1. In the [Azure portal](https://portal.azure.com), open your logic app in the Logic App Designer.
353
353
@@ -381,12 +381,12 @@ Many triggers and actions have settings to hide inputs, outputs, or both from a
381
381
382
382
<aname="secure-data-code-view"></a>
383
383
384
-
#### Hide inputs and outputs in code view
384
+
#### Secure inputs and outputs in code view
385
385
386
386
In the underlying trigger or action definition, add or update the `runtimeConfiguration.secureData.properties` array with either or both of these values:
387
387
388
-
*`"inputs"`: Hides inputs in run history.
389
-
*`"outputs"`: Hides outputs in run history.
388
+
*`"inputs"`: Secures inputs in run history.
389
+
*`"outputs"`: Secures outputs in run history.
390
390
391
391
Here are some [considerations to review](#obfuscation-considerations) when you use these settings to help you secure this data.
392
392
@@ -416,7 +416,7 @@ Here are some [considerations to review](#obfuscation-considerations) when you u
416
416
417
417
* The [Logic Apps API for handling workflow history](https://docs.microsoft.com/rest/api/logic/) doesn't return secured outputs.
418
418
419
-
* To hide outputs from an action that obscures inputs or explicitly obscures outputs, manually turn on **Secure Outputs** in that action.
419
+
* To secure outputs from an action that obscures inputs or explicitly obscures outputs, manually turn on **Secure Outputs** in that action.
420
420
421
421
* Make sure that you turn on **Secure Inputs** or **Secure Outputs** in downstream actions where you expect the run history to obscure that data.
422
422
@@ -456,19 +456,19 @@ For example, if you authenticate HTTP actions with [Azure Active Directory Open
456
456
457
457
For more information, see these sections in this topic:
458
458
459
-
*[Protect parameters in workflow definitions](#secure-parameters-workflow)
460
-
*[Hide data from run history by using obfuscation](#obfuscate)
459
+
*[Secure parameters in workflow definitions](#secure-parameters-workflow)
460
+
*[Secure data in run history by using obfuscation](#obfuscate)
461
461
462
462
If you [automate deployment for logic apps by using Resource Manager templates](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can define secured [template parameters](../azure-resource-manager/templates/template-parameters.md), which are evaluated at deployment, by using the `securestring` and `secureobject` types. To define template parameters, use your template's top level `parameters` section, which is separate and different from your workflow definition's `parameters` section. To provide the values for template parameters, use a separate [parameter file](../azure-resource-manager/templates/parameter-files.md).
463
463
464
464
For example, if you use secrets, you can define and use secured template parameters that retrieve those secrets from [Azure Key Vault](../key-vault/key-vault-overview.md) at deployment. You can then reference the key vault and secret in your parameter file. For more information, see these topics:
465
465
466
466
*[Pass sensitive values at deployment by using Azure Key Vault](../azure-resource-manager/templates/key-vault-parameter.md)
467
-
*[Protect parameters in Azure Resource Manager templates](#secure-parameters-deployment-template) later in this topic
467
+
*[Secure parameters in Azure Resource Manager templates](#secure-parameters-deployment-template) later in this topic
468
468
469
469
<aname="secure-parameters-workflow"></a>
470
470
471
-
### Protect parameters in workflow definitions
471
+
### Secure parameters in workflow definitions
472
472
473
473
To protect sensitive information in your logic app's workflow definition, use secured parameters so this information isn't visible after you save your logic app. For example, suppose you have an HTTP action requires basic authentication, which uses a username and password. In the workflow definition, the `parameters` section defines the `basicAuthPasswordParam` and `basicAuthUsernameParam` parameters by using the `securestring` type. The action definition then references these parameters in the `authentication` section.
474
474
@@ -514,7 +514,7 @@ To protect sensitive information in your logic app's workflow definition, use se
### Protect parameters in Azure Resource Manager templates
517
+
### Secure parameters in Azure Resource Manager templates
518
518
519
519
A [Resource Manager template](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md) for a logic app has multiple `parameters` sections. To protect passwords, keys, secrets, and other sensitive information, define secured parameters at the template level and workflow definition level by using the `securestring` or `secureobject` type. You can then store these values in [Azure Key Vault](../key-vault/key-vault-overview.md) and use the [parameter file](../azure-resource-manager/templates/parameter-files.md) to reference the key vault and secret. Your template then retrieves that information at deployment. For more information, see [Pass sensitive values at deployment by using Azure Key Vault](../azure-resource-manager/templates/key-vault-parameter.md).
0 commit comments