Skip to content

Commit 5c78105

Browse files
authored
Clarity edit
1 parent 20a858b commit 5c78105

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -530,9 +530,9 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
530530

531531
> [!NOTE]
532532
>
533-
> Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control (IAM) on
534-
> the logic app resource, you must make sure that the calls from these target systems (IP addresses) have permissions
535-
> to access your logic app. The following connectors make inbound webhook callbacks to Azure Logic Apps:
533+
> Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control, for example, IAM in a
534+
> Consumption logic app, on the logic app resource, you must make sure that the calls from these target systems (IP addresses)
535+
> have permissions to access your logic app. The following connectors make inbound webhook callbacks to Azure Logic Apps:
536536
>
537537
> Adobe Creative Cloud, Adobe Sign, Adobe Sign Demo, Adobe Sign Preview, Adobe Sign Stage, Microsoft Sentinel, Event Grid,
538538
> Microsoft Form, Business Central, Calendly, Common Data Service, DocuSign, DocuSign Demo, Dynamics 365 for Fin & Ops,

0 commit comments

Comments
 (0)