You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-reqres.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,12 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
17
17
* Trigger a workflow when an external webhook event happens.
18
18
* Receive and respond to an HTTPS call from another logic app.
19
19
20
+
The Request trigger supports [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to your logic app. For more information about enabling this authentication, see [Secure access and data in Azure Logic Apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
21
+
20
22
> [!NOTE]
21
-
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
22
-
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23
-
>
23
+
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls.
24
+
> Outgoing calls support TLS 1.0, 1.1, and 1.2. For more information, see
25
+
>[Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
24
26
> If you see SSL handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
25
27
>
26
28
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
@@ -31,6 +33,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
31
33
> * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
32
34
> * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
33
35
> * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
36
+
>
34
37
35
38
## Prerequisites
36
39
@@ -183,8 +186,6 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
183
186
184
187
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
185
188
186
-
Request triggers support using [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) for authenticating incoming calls. For more information about enabling this support, see [Securing logic apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
187
-
188
189
### Trigger outputs
189
190
190
191
Here's more information about the outputs from the Request trigger:
0 commit comments