Skip to content

Commit b49a7c3

Browse files
committed
Add partial updates for Request trigger OAuth
1 parent 34c0707 commit b49a7c3

File tree

4 files changed

+40
-5
lines changed

4 files changed

+40
-5
lines changed

articles/connectors/connectors-native-reqres.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewers: klam, logicappspm
77
ms.topic: conceptual
8-
ms.date: 01/14/2020
8+
ms.date: 02/20/2020
99
tags: connectors
1010
---
1111

@@ -42,7 +42,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
4242

4343
## Add Request trigger
4444

45-
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app. For more information about the trigger's underlying JSON definition and how to call this trigger, see the [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
45+
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app.
4646

4747
1. Sign in to the [Azure portal](https://portal.azure.com). Create a blank logic app.
4848

@@ -173,14 +173,18 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
173173

174174
Your logic app keeps the incoming request open only for one minute. Assuming that your logic app workflow includes a Response action, if the logic app doesn't return a response after this time passes, your logic app returns a `504 GATEWAY TIMEOUT` to the caller. Otherwise, if your logic app doesn't include a Response action, your logic app immediately returns a `202 ACCEPTED` response to the caller.
175175

176-
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
176+
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
177177

178178
This step generates the URL to use for sending the request that triggers the logic app. To copy this URL, select the copy icon next to the URL.
179179

180180
![URL to use triggering your logic app](./media/connectors-native-reqres/generated-url.png)
181181

182182
1. To trigger your logic app, send an HTTP POST to the generated URL. For example, you can use a tool such as [Postman](https://www.getpostman.com/).
183183

184+
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
185+
186+
Request triggers support using [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) for authenticating incoming calls. For more information about enabling this support, see [Securing logic apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
187+
184188
### Trigger outputs
185189

186190
Here's more information about the outputs from the Request trigger:

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -615,7 +615,7 @@ HTTP and HTTPS endpoints support various kinds of authentication. Based on the t
615615
|---------------------|--------------|
616616
| [Basic](#basic-authentication) | Azure API Management, Azure App Services, HTTP, HTTP + Swagger, HTTP Webhook |
617617
| [Client Certificate](#client-certificate-authentication) | Azure API Management, Azure App Services, HTTP, HTTP + Swagger, HTTP Webhook |
618-
| [Active Directory OAuth](#azure-active-directory-oauth-authentication) | Azure API Management, Azure App Services, Azure Functions, HTTP, HTTP + Swagger, HTTP Webhook |
618+
| [Active Directory OAuth](#azure-active-directory-oauth-authentication) | Azure API Management, Azure App Services, Azure Functions, HTTP, HTTP + Swagger, HTTP Webhook, Request |
619619
| [Raw](#raw-authentication) | Azure API Management, Azure App Services, Azure Functions, HTTP, HTTP + Swagger, HTTP Webhook |
620620
| [Managed identity](#managed-identity-authentication) | Azure API Management, Azure App Services, Azure Functions, HTTP, HTTP + Swagger, HTTP Webhook |
621621
|||
@@ -694,7 +694,7 @@ For more information about securing services by using client certificate authent
694694

695695
### Azure Active Directory OAuth authentication
696696

697-
If the [Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) option is available, specify these property values:
697+
On Request triggers, you can use [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) for authenticating incoming calls after you [set up Azure Active Directory authorization policies](#enable-oauth) for your logic app. For all other triggers and actions that provide the **Active Directory OAuth** authentication type for you to select, specify these property values:
698698

699699
| Property (designer) | Property (JSON) | Required | Value | Description |
700700
|---------------------|-----------------|----------|-------|-------------|
@@ -730,6 +730,37 @@ When you use [secured parameters](#secure-action-parameters) to handle and prote
730730
}
731731
```
732732

733+
<a name="enable-oauth"></a>
734+
735+
### Enable Azure AD OAuth authentication on Request triggers
736+
737+
To enable [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) authentication for incoming calls to Request triggers, follow these steps to set up an authorization policy. Here are some considerations for enabling this authentication support:
738+
739+
* Your logic app can have up to five authorization policies. Each authorization policy can have up to 10 claims.
740+
741+
* An authorization policy must include the **Issuer** claim, which starts with the Azure Active Directory issuer ID, `https://sts.windows.net/`.
742+
743+
* Your logic app can't use both [Shared Access Signatures (SAS)](#sas) and Azure AD OAuth.
744+
745+
* Currently, open authentication tokens are supported only for workflow trigger requests.
746+
747+
* Only Bearer-type authorization schemes are supported for OAuth tokens.
748+
749+
1. In the [Azure portal](https://portal.microsoft.com), find and open your logic app in the Logic App Designer.
750+
751+
1. On the logic app menu, under **Settings**, select **Authorization**. After the Authorization pane opens, select **Add policy**.
752+
753+
![Select "Authorization" > "Add policy"](./media/logic-apps-securing-a-logic-app/add-azure-active-directory-authorization-policies.png)
754+
755+
1. Provide this information for the claims in your policy:
756+
757+
![Provide information about the authorization policy](./media/logic-apps-securing-a-logic-app/set-up-authorization-policy.png)
758+
759+
| Property | Required | Description |
760+
|----------|----------|-------------|
761+
|
762+
|||
763+
733764
<a name="raw-authentication"></a>
734765

735766
### Raw authentication
74.8 KB
Loading
74.8 KB
Loading

0 commit comments

Comments
 (0)