Skip to content

Commit 878a150

Browse files
committed
Clarity edits for link to Azure AD OAuth
1 parent 339b195 commit 878a150

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/connectors/connectors-native-reqres.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,12 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
1717
* Trigger a workflow when an external webhook event happens.
1818
* Receive and respond to an HTTPS call from another logic app.
1919

20+
The Request trigger supports [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to your logic app. For more information about enabling this authentication, see [Secure access and data in Azure Logic Apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
21+
2022
> [!NOTE]
21-
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
22-
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23-
>
23+
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls.
24+
> Outgoing calls support TLS 1.0, 1.1, and 1.2. For more information, see
25+
> [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
2426
> If you see SSL handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
2527
>
2628
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
@@ -31,6 +33,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
3133
> * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
3234
> * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
3335
> * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
36+
>
3437
3538
## Prerequisites
3639

@@ -183,8 +186,6 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
183186

184187
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
185188

186-
Request triggers support using [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) for authenticating incoming calls. For more information about enabling this support, see [Securing logic apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
187-
188189
### Trigger outputs
189190

190191
Here's more information about the outputs from the Request trigger:

0 commit comments

Comments
 (0)