Skip to content

Commit ae3f325

Browse files
committed
Clarity edits
1 parent 7655930 commit ae3f325

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ If you [automate deployment for logic apps by using Resource Manager templates](
163163

164164
### Add Azure Active Directory OAuth or other security
165165

166-
To add more authorization protocols to your logic app, consider using the [Azure API Management](../api-management/api-management-key-concepts.md) service. This service helps you expose your logic app as an API and offers rich monitoring, security, policy, and documentation for any endpoint. API Management can expose a public or private endpoint for your logic app. You can then use Azure Active Directory OAuth, client certificate, or other security standards for authorizing access to that endpoint. When API Management receives a request, the service sends the request to your logic app, also making any necessary transformations or restrictions along the way. To let only API Management trigger your logic app, you can use your logic app's inbound IP range settings.
166+
To add more authorization protocols to your logic app, consider using the [Azure API Management](../api-management/api-management-key-concepts.md) service. This service helps you expose your logic app as an API and offers rich monitoring, security, policy, and documentation for any endpoint. API Management can expose a public or private endpoint for your logic app. To authorize access to this endpoint, you can use [Azure Active Directory OAuth](#azure-active-directory-oauth-authentication), [client certificate](#client-certificate-authentication), or other security standards for authorizing access to that endpoint. When API Management receives a request, the service sends the request to your logic app, also making any necessary transformations or restrictions along the way. To let only API Management trigger your logic app, you can use your logic app's inbound IP range settings.
167167

168168
<a name="secure-operations"></a>
169169

@@ -577,8 +577,11 @@ Here are some ways that you can secure endpoints that receive calls or requests
577577
When you work with an HTTP-based trigger or action that makes outbound calls, such as HTTP, HTTP + Swagger, or Webhook, you can add authentication to the request that's sent by your logic app. For example, you can use these authentication types:
578578

579579
* [Basic authentication](#basic-authentication)
580+
580581
* [Client certificate authentication](#client-certificate-authentication)
582+
581583
* [Active Directory OAuth authentication](#azure-active-directory-oauth-authentication)
584+
582585
* [Managed identity authentication](#managed-identity-authentication)
583586

584587
For more information, see [Add authentication to outbound calls](#add-authentication-outbound) later in this topic.
@@ -661,7 +664,7 @@ If the [Client Certificate](../active-directory/authentication/active-directory-
661664
|---------------------|-----------------|----------|-------|-------------|
662665
| **Authentication** | `type` | Yes | **Client Certificate** <br>or <br>`ClientCertificate` | The authentication type to use for Secure Sockets Layer (SSL) client certificates. While self-signed certificates are supported, self-signed certificates for SSL aren't supported. |
663666
| **Pfx** | `pfx` | Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file |
664-
| **Password** | `password`| - No (code) <br>- Yes (designer) | <*password-for-pfx-file*> | The password for accessing the PFX file |
667+
| **Password** | `password`| See description | <*password-for-pfx-file*> | The password for accessing the PFX file. <p><p>**Note**: This property value is required when you work in the Logic App Designer and is *not* required when you work in code view. |
665668
|||||
666669

667670
When you use [secured parameters](#secure-action-parameters) to handle and protect sensitive information, for example, in an [Azure Resource Manager template for automating deployment](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can use expressions to access these parameter values at runtime. This example HTTP action definition specifies the authentication `type` as `ClientCertificate` and uses the [parameters() function](../logic-apps/workflow-definition-language-functions-reference.md#parameters) to get the parameter values:

0 commit comments

Comments
 (0)