@@ -530,13 +530,13 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
530
530
531
531
> [ !NOTE]
532
532
>
533
- > Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control, for example, IAM in a
534
- > Consumption logic app, on the logic app resource, you must make sure that the calls from these target systems (IP addresses)
535
- > have permissions to access your logic app. The following connectors make inbound webhook callbacks to Azure Logic Apps:
533
+ > Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control on the logic app resource,
534
+ > you must make sure that the calls from these target systems (IP addresses) have permissions to access your logic app. The following
535
+ > connectors make inbound webhook callbacks to Azure Logic Apps:
536
536
>
537
537
> Adobe Creative Cloud, Adobe Sign, Adobe Sign Demo, Adobe Sign Preview, Adobe Sign Stage, Microsoft Sentinel, Event Grid,
538
538
> Microsoft Form, Business Central, Calendly, Common Data Service, DocuSign, DocuSign Demo, Dynamics 365 for Fin & Ops,
539
- > LiveChat, Office 365 Outlook, Outlook.com, Parserr, SAP* , Shifts for Microsoft Teams, Teamwork Projects, Typeform, and so on.
539
+ > LiveChat, Office 365* Outlook, Outlook.com, Parserr, SAP* , Shifts for Microsoft Teams, Teamwork Projects, Typeform, and so on:
540
540
>
541
541
> - ** Office 365** : The return caller is actually the Office 365 connector. You can specify the managed connector outbound
542
542
> IP address prefixes for each region, or optionally, you can use the ** AzureConnectors** service tag for these managed connectors.
0 commit comments