You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/enable-stateful-affinity-built-in-connectors.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,21 +36,21 @@ To run these connector operations in stateful mode, you must enable this capabil
36
36
37
37
1. In the [Azure portal](https://portal.azure.com), open the Standard logic app resource where you want to enable stateful mode for these connector operations.
38
38
39
-
1.Enable virtual network integration for your logic app and add your logic app to the previously created subnet:
39
+
1.To enable virtual network integration for your logic app, and add your logic app to the previously created subnet, follow these steps:
40
40
41
-
1. On your logic app menu resource, under **Settings**, select **Networking**.
41
+
1. On the logic app menu resource, under **Settings**, select **Networking**.
42
42
43
-
1. In the **Outbound Traffic** section, select **VNET integration**> **Add VNet**.
43
+
1. In the **Outbound traffic configuration** section, next to **Virtual network integration**, select **Not configured**> **Add virtual network integration**.
44
44
45
-
1. On the **Add VNet Integration** pane that opens, select your Azure subscription and your virtual network.
45
+
1. On the **Add virtual network integration** pane that opens, select your Azure subscription and your virtual network.
46
46
47
-
1.Under **Subnet**, select **Select existing**. From the **Subnet** list, select the subnet where you want to add your logic app.
47
+
1. From the **Subnet** list, select the subnet where you want to add your logic app.
48
48
49
-
1. When you're done, select **OK**.
49
+
1. When you're done, select **Connect**, and return to the **Networking** page.
50
50
51
-
On the **Networking** page, the **VNet integration**option now appears set to **On**, for example:
51
+
The **Virtual network integration**property is now set to the selected virtual network and subnet, for example:
52
52
53
-
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page, VNet integration set to On.":::
53
+
:::image type="content" source="media/enable-stateful-affinity-built-in-connectors/enable-virtual-network-integration.png" alt-text="Screenshot shows Azure portal, Standard logic app resource, Networking page with selected virtual network and subnet.":::
54
54
55
55
For general information about enabling virtual network integration with your app, see [Enable virtual network integration in Azure App Service](../app-service/configure-vnet-integration-enable.md).
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+14-10Lines changed: 14 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -87,29 +87,31 @@ You can limit access to the inputs and outputs in the run history for your logic
87
87
88
88
For example, to block anyone from accessing inputs and outputs, specify an IP address range such as `0.0.0.0-0.0.0.0`. Only a person with administrator permissions can remove this restriction, which provides the possibility for "just-in-time" access to data in your logic app workflows. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
89
89
90
-
To specify the allowed IP ranges, follow these steps for either the Azure portal or your Azure Resource Manager template:
90
+
To specify the allowed IP ranges, follow these steps for your Consumption or Standard logic app in the Azure portal or your Azure Resource Manager template:
91
91
92
92
#### [Portal](#tab/azure-portal)
93
93
94
94
##### Consumption workflows
95
95
96
-
1. In the [Azure portal](https://portal.azure.com), open your logic app workflow in the designer.
96
+
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
97
97
98
98
1. On your logic app's menu, under **Settings**, select **Workflow settings**.
99
99
100
-
1.Under **Access control configuration**> **Allowed inbound IP addresses**, select **Specific IP ranges**.
100
+
1.In the **Access control configuration**section, under **Allowed inbound IP addresses**, from the **Trigger access option** list, select **Specific IP ranges**.
101
101
102
-
1.Under **IP ranges for contents**, specify the IP address ranges that can access content from inputs and outputs.
102
+
1.In the **IP ranges for contents** box, specify the IP address ranges that can access content from inputs and outputs.
103
103
104
104
##### Standard workflows
105
105
106
-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
106
+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
107
107
108
108
1. On the logic app menu, under **Settings**, select **Networking**.
109
109
110
-
1. In the **Inbound Traffic** section, select **Access restriction**.
110
+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
111
111
112
-
1. Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings.
112
+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
113
+
114
+
1. Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
113
115
114
116
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
115
117
@@ -979,13 +981,15 @@ In the Azure portal, IP address restriction affects both triggers *and* actions,
979
981
980
982
##### Standard workflows
981
983
982
-
1. In the [Azure portal](https://portal.azure.com), open your logic app resource.
984
+
1. In the [Azure portal](https://portal.azure.com), open your Standard logic app resource.
983
985
984
986
1. On the logic app menu, under **Settings**, select **Networking**.
985
987
986
-
1. In the **Inbound Traffic** section, select **Access restriction**.
988
+
1. In the **Inbound traffic configuration** section, next to **Public network access**, select **Enabled with no access restriction**.
989
+
990
+
1. On the **Access restrictions** page, under **App access**, select **Enabled from select virtual networks and IP addresses**.
987
991
988
-
1.Create one or more rules to either **Allow** or **Deny** requests from specific IP ranges. You can also use the HTTP header filter settings and forwarding settings. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
992
+
1.Under **Site access and rules**, on the **Main site** tab, add one or more rules to either **Allow** or **Deny** requests from specific IP ranges. A valid IP range uses these formats: *x.x.x.x/x* or *x.x.x.x-x.x.x.x*
989
993
990
994
For more information, see [Blocking inbound IP addresses in Azure Logic Apps (Standard)](https://www.serverlessnotes.com/docs/block-inbound-ip-addresses-in-azure-logic-apps-standard).
0 commit comments