Skip to content

Commit 43609ed

Browse files
committed
Restore security terminology
1 parent 3d8cb76 commit 43609ed

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -278,9 +278,9 @@ To control access to the inputs and outputs in your logic app's run history, you
278278

279279
This option helps you secure access to run history based on the requests from a specific IP address range.
280280

281-
* [Hide data from run history by using obfuscation](#obfuscate).
281+
* [Secure data in run history by using obfuscation](#obfuscate).
282282

283-
In many triggers and actions, you can hide their inputs, outputs, or both from a logic app's run history.
283+
In many triggers and actions, you can secure the inputs, outputs, or both in a logic app's run history.
284284

285285
<a name="restrict-ip"></a>
286286

@@ -343,11 +343,11 @@ If you [automate deployment for logic apps by using Resource Manager templates](
343343

344344
<a name="obfuscate"></a>
345345

346-
### Hide data from run history by using obfuscation
346+
### Secure data in run history by using obfuscation
347347

348-
Many triggers and actions have settings to hide inputs, outputs, or both from a logic app's run history. Before using these settings to help you secure this data, [review these considerations](#obfuscation-considerations).
348+
Many triggers and actions have settings to secure inputs, outputs, or both from a logic app's run history. Before using these settings to help you secure this data, [review these considerations](#obfuscation-considerations).
349349

350-
#### Hide inputs and outputs in the designer
350+
#### Secure inputs and outputs in the designer
351351

352352
1. In the [Azure portal](https://portal.azure.com), open your logic app in the Logic App Designer.
353353

@@ -381,12 +381,12 @@ Many triggers and actions have settings to hide inputs, outputs, or both from a
381381

382382
<a name="secure-data-code-view"></a>
383383

384-
#### Hide inputs and outputs in code view
384+
#### Secure inputs and outputs in code view
385385

386386
In the underlying trigger or action definition, add or update the `runtimeConfiguration.secureData.properties` array with either or both of these values:
387387

388-
* `"inputs"`: Hides inputs in run history.
389-
* `"outputs"`: Hides outputs in run history.
388+
* `"inputs"`: Secures inputs in run history.
389+
* `"outputs"`: Secures outputs in run history.
390390

391391
Here are some [considerations to review](#obfuscation-considerations) when you use these settings to help you secure this data.
392392

@@ -416,7 +416,7 @@ Here are some [considerations to review](#obfuscation-considerations) when you u
416416

417417
* The [Logic Apps API for handling workflow history](https://docs.microsoft.com/rest/api/logic/) doesn't return secured outputs.
418418

419-
* To hide outputs from an action that obscures inputs or explicitly obscures outputs, manually turn on **Secure Outputs** in that action.
419+
* To secure outputs from an action that obscures inputs or explicitly obscures outputs, manually turn on **Secure Outputs** in that action.
420420

421421
* Make sure that you turn on **Secure Inputs** or **Secure Outputs** in downstream actions where you expect the run history to obscure that data.
422422

@@ -456,19 +456,19 @@ For example, if you authenticate HTTP actions with [Azure Active Directory Open
456456
457457
For more information, see these sections in this topic:
458458

459-
* [Protect parameters in workflow definitions](#secure-parameters-workflow)
460-
* [Hide data from run history by using obfuscation](#obfuscate)
459+
* [Secure parameters in workflow definitions](#secure-parameters-workflow)
460+
* [Secure data in run history by using obfuscation](#obfuscate)
461461

462462
If you [automate deployment for logic apps by using Resource Manager templates](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can define secured [template parameters](../azure-resource-manager/templates/template-parameters.md), which are evaluated at deployment, by using the `securestring` and `secureobject` types. To define template parameters, use your template's top level `parameters` section, which is separate and different from your workflow definition's `parameters` section. To provide the values for template parameters, use a separate [parameter file](../azure-resource-manager/templates/parameter-files.md).
463463

464464
For example, if you use secrets, you can define and use secured template parameters that retrieve those secrets from [Azure Key Vault](../key-vault/key-vault-overview.md) at deployment. You can then reference the key vault and secret in your parameter file. For more information, see these topics:
465465

466466
* [Pass sensitive values at deployment by using Azure Key Vault](../azure-resource-manager/templates/key-vault-parameter.md)
467-
* [Protect parameters in Azure Resource Manager templates](#secure-parameters-deployment-template) later in this topic
467+
* [Secure parameters in Azure Resource Manager templates](#secure-parameters-deployment-template) later in this topic
468468

469469
<a name="secure-parameters-workflow"></a>
470470

471-
### Protect parameters in workflow definitions
471+
### Secure parameters in workflow definitions
472472

473473
To protect sensitive information in your logic app's workflow definition, use secured parameters so this information isn't visible after you save your logic app. For example, suppose you have an HTTP action requires basic authentication, which uses a username and password. In the workflow definition, the `parameters` section defines the `basicAuthPasswordParam` and `basicAuthUsernameParam` parameters by using the `securestring` type. The action definition then references these parameters in the `authentication` section.
474474

@@ -514,7 +514,7 @@ To protect sensitive information in your logic app's workflow definition, use se
514514

515515
<a name="secure-parameters-deployment-template"></a>
516516

517-
### Protect parameters in Azure Resource Manager templates
517+
### Secure parameters in Azure Resource Manager templates
518518

519519
A [Resource Manager template](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md) for a logic app has multiple `parameters` sections. To protect passwords, keys, secrets, and other sensitive information, define secured parameters at the template level and workflow definition level by using the `securestring` or `secureobject` type. You can then store these values in [Azure Key Vault](../key-vault/key-vault-overview.md) and use the [parameter file](../azure-resource-manager/templates/parameter-files.md) to reference the key vault and secret. Your template then retrieves that information at deployment. For more information, see [Pass sensitive values at deployment by using Azure Key Vault](../azure-resource-manager/templates/key-vault-parameter.md).
520520

0 commit comments

Comments
 (0)