Skip to content

Commit 7f2304e

Browse files
authored
Merge pull request #112263 from ecfan/ssl-http
Add info that intermediate TLS/SSL certificates aren't supported
2 parents 9a1561d + 88e16e3 commit 7f2304e

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

articles/connectors/connectors-native-http.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Call service endpoints by using HTTP or HTTPS
33
description: Send outbound HTTP or HTTPS requests to service endpoints from Azure Logic Apps
44
services: logic-apps
55
ms.suite: integration
6-
ms.reviewer: klam, logicappspm
6+
ms.reviewer: jonfan, logicappspm
77
ms.topic: conceptual
88
ms.date: 03/12/2020
99
tags: connectors
@@ -18,6 +18,8 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in H
1818
> versions 1.0, 1.1, and 1.2. Logic Apps negotiates with the endpoint over using the highest supported
1919
> version possible. So for example, if the endpoint supports 1.2, the connector uses 1.2 first.
2020
> Otherwise, the connector uses the next highest supported version.
21+
>
22+
> The HTTP connector doesn't support intermediate TLS/SSL certificates for authentication.
2123
2224
To check or *poll* an endpoint on a recurring schedule, [add the HTTP trigger](#http-trigger) as the first step in your workflow. Each time that the trigger checks the endpoint, the trigger calls or sends a *request* to the endpoint. The endpoint's response determines whether your logic app's workflow runs. The trigger passes any content from the endpoint's response to the actions in your logic app.
2325

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -659,7 +659,7 @@ If the [Client Certificate](../active-directory/authentication/active-directory-
659659

660660
| Property (designer) | Property (JSON) | Required | Value | Description |
661661
|---------------------|-----------------|----------|-------|-------------|
662-
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for TLS/SSL client certificates. While self-signed certificates are supported, self-signed certificates for TLS/SSL aren't supported. |
662+
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for TLS/SSL client certificates <p><p>**Note**: While self-signed certificates are supported, self-signed certificates for TLS/SSL aren't supported. The HTTP connector doesn't support intermediate TLS/SSL certificates. |
663663
| **Pfx** | `pfx` | Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file <p><p>To convert the PFX file into base64-encoded format, you can use PowerShell by following these steps: <p>1. Save the certificate content into a variable: <p> `$pfx_cert = get-content 'c:\certificate.pfx' -Encoding Byte` <p>2. Convert the certificate content by using the `ToBase64String()` function and save that content to a text file: <p> `[System.Convert]::ToBase64String($pfx_cert) | Out-File 'pfx-encoded-bytes.txt'` |
664664
| **Password** | `password`| No | <*password-for-pfx-file*> | The password for accessing the PFX file |
665665
|||||

0 commit comments

Comments
 (0)