You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-reqres.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewers: klam, logicappspm
7
7
ms.topic: conceptual
8
-
ms.date: 01/14/2020
8
+
ms.date: 02/20/2020
9
9
tags: connectors
10
10
---
11
11
@@ -42,7 +42,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
42
42
43
43
## Add Request trigger
44
44
45
-
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app. For more information about the trigger's underlying JSON definition and how to call this trigger, see the [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
45
+
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app.
46
46
47
47
1. Sign in to the [Azure portal](https://portal.azure.com). Create a blank logic app.
48
48
@@ -173,14 +173,18 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
173
173
174
174
Your logic app keeps the incoming request open only for one minute. Assuming that your logic app workflow includes a Response action, if the logic app doesn't return a response after this time passes, your logic app returns a `504 GATEWAY TIMEOUT` to the caller. Otherwise, if your logic app doesn't include a Response action, your logic app immediately returns a `202 ACCEPTED` response to the caller.
175
175
176
-
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
176
+
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
177
177
178
178
This step generates the URL to use for sending the request that triggers the logic app. To copy this URL, select the copy icon next to the URL.
179
179
180
180

181
181
182
182
1. To trigger your logic app, send an HTTP POST to the generated URL. For example, you can use a tool such as [Postman](https://www.getpostman.com/).
183
183
184
+
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
185
+
186
+
Request triggers support using [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) for authenticating incoming calls. For more information about enabling this support, see [Securing logic apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
187
+
184
188
### Trigger outputs
185
189
186
190
Here's more information about the outputs from the Request trigger:
@@ -694,7 +694,7 @@ For more information about securing services by using client certificate authent
694
694
695
695
### Azure Active Directory OAuth authentication
696
696
697
-
If the [Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md)option is available, specify these property values:
697
+
On Request triggers, you can use [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md)for authenticating incoming calls after you [set up Azure Active Directory authorization policies](#enable-oauth) for your logic app. For all other triggers and actions that provide the **Active Directory OAuth** authentication type for you to select, specify these property values:
@@ -730,6 +730,37 @@ When you use [secured parameters](#secure-action-parameters) to handle and prote
730
730
}
731
731
```
732
732
733
+
<aname="enable-oauth"></a>
734
+
735
+
### Enable Azure AD OAuth authentication on Request triggers
736
+
737
+
To enable [Azure Active Directory OAuth](../active-directory/develop/about-microsoft-identity-platform.md) authentication for incoming calls to Request triggers, follow these steps to set up an authorization policy. Here are some considerations for enabling this authentication support:
738
+
739
+
* Your logic app can have up to five authorization policies. Each authorization policy can have up to 10 claims.
740
+
741
+
* An authorization policy must include the **Issuer** claim, which starts with the Azure Active Directory issuer ID, `https://sts.windows.net/`.
742
+
743
+
* Your logic app can't use both [Shared Access Signatures (SAS)](#sas) and Azure AD OAuth.
744
+
745
+
* Currently, open authentication tokens are supported only for workflow trigger requests.
746
+
747
+
* Only Bearer-type authorization schemes are supported for OAuth tokens.
748
+
749
+
1. In the [Azure portal](https://portal.microsoft.com), find and open your logic app in the Logic App Designer.
750
+
751
+
1. On the logic app menu, under **Settings**, select **Authorization**. After the Authorization pane opens, select **Add policy**.
0 commit comments