Skip to content

Commit 46eb08e

Browse files
author
ecfan
committed
Clarify steps to find Networking page
1 parent 39273dc commit 46eb08e

File tree

3 files changed

+22
-18
lines changed

3 files changed

+22
-18
lines changed

articles/connectors/enable-stateful-affinity-built-in-connectors.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -36,21 +36,21 @@ To run these connector operations in stateful mode, you must enable this capabil
3636

3737
1. In the [Azure portal](https://portal.azure.com), open the Standard logic app resource where you want to enable stateful mode for these connector operations.
3838

39-
1. Enable virtual network integration for your logic app and add your logic app to the previously created subnet:
39+
1. To enable virtual network integration for your logic app, and add your logic app to the previously created subnet, follow these steps:
4040

41-
1. On your logic app menu resource, under **Settings**, select **Networking**.
41+
1. On the logic app menu resource, under **Settings**, select **Networking**.
4242

43-
1. In the **Outbound Traffic** section, select **VNET integration** > **Add VNet**.
43+
1. In the **Outbound traffic configuration** section, next to **Virtual network integration**, select **Not configured** > **Add virtual network integration**.
4444

45-
1. On the **Add VNet Integration** pane that opens, select your Azure subscription and your virtual network.
45+
1. On the **Add virtual network integration** pane that opens, select your Azure subscription and your virtual network.
4646

47-
1. Under **Subnet**, select **Select existing**. From the **Subnet** list, select the subnet where you want to add your logic app.
47+
1. From the **Subnet** list, select the subnet where you want to add your logic app.
4848

49-
1. When you're done, select **OK**.
49+
1. When you're done, select **Connect**, and return to the **Networking** page.
5050

51-
On the **Networking** page, the **VNet integration** option now appears set to **On**, for example:
51+
The **Virtual network integration** property is now set to the selected virtual network and subnet, for example:
5252

53-
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page, VNet integration set to On.":::
53+
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page with selected virtual network and subnet.":::
5454

5555
For general information about enabling virtual network integration with your app, see [Enable virtual network integration in Azure App Service](../app-service/configure-vnet-integration-enable.md).
5656

22.3 KB
Loading

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -87,29 +87,31 @@ You can limit access to the inputs and outputs in the run history for your logic
8787

8888
For example, to block anyone from accessing inputs and outputs, specify an IP address range such as `0.0.0.0-0.0.0.0`. Only a person with administrator permissions can remove this restriction, which provides the possibility for "just-in-time" access to data in your logic app workflows. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
8989

90-
To specify the allowed IP ranges, follow these steps for either the Azure portal or your Azure Resource Manager template:
90+
To specify the allowed IP ranges, follow these steps for your Consumption or Standard logic app in the Azure portal or your Azure Resource Manager template:
9191

9292
#### [Portal](#tab/azure-portal)
9393

9494
##### Consumption workflows
9595

96-
1. In the [Azure portal](https://portal.azure.com), open your logic app workflow in the designer.
96+
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
9797

9898
1. On your logic app's menu, under **Settings**, select **Workflow settings**.
9999

100-
1. Under **Access control configuration** > **Allowed inbound IP addresses**, select **Specific IP ranges**.
100+
1. In the **Access control configuration** section, under **Allowed inbound IP addresses**, from the **Trigger access option** list, select **Specific IP ranges**.
101101

102-
1. Under **IP ranges for contents**, specify the IP address ranges that can access content from inputs and outputs.
102+
1. In the **IP ranges for contents** box, specify the IP address ranges that can access content from inputs and outputs.
103103

104104
##### Standard workflows
105105

106-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
106+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
107107

108108
1. On the logic app menu, under **Settings**, select **Networking**.
109109

110-
1. In the **Inbound Traffic** section, select **Access restriction**.
110+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
111111

112-
1. Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings.
112+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
113+
114+
1. Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
113115

114116
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
115117

@@ -979,13 +981,15 @@ In the Azure portal, IP address restriction affects both triggers *and* actions,
979981

980982
##### Standard workflows
981983

982-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
984+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
983985

984986
1. On the logic app menu, under **Settings**, select **Networking**.
985987

986-
1. In the **Inbound Traffic** section, select **Access restriction**.
988+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
989+
990+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
987991

988-
1. Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
992+
1. Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
989993

990994
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
991995

0 commit comments

Comments
 (0)