Skip to content

Commit c173084

Browse files
committed
Update Transport Layer Security info
1 parent 4f897a1 commit c173084

File tree

3 files changed

+11
-5
lines changed

3 files changed

+11
-5
lines changed

articles/connectors/connectors-native-reqres.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: estfan
99
ms.reviewers: klam, LADocs
1010
manager: carmonm
1111
ms.assetid: 566924a4-0988-4d86-9ecd-ad22507858c0
12-
ms.topic: article
13-
ms.date: 09/06/2019
12+
ms.topic: conceptual
13+
ms.date: 10/07/2019
1414
tags: connectors
1515
---
1616

@@ -22,7 +22,9 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
2222
* Trigger a workflow when an external webhook event happens.
2323
* Receive and respond to an HTTPS call from another logic app.
2424

25-
The Request trigger supports *only* HTTPS. To make outgoing HTTP or HTTPS calls instead, use the built-in [HTTP trigger or action](../connectors/connectors-native-http.md).
25+
> [!NOTE]
26+
> The Request trigger supports *only* HTTPS and Transport Layer Security (TLS) 1.2.
27+
> To make outgoing HTTP or HTTPS calls instead, use the built-in [HTTP trigger or action](../connectors/connectors-native-http.md) instead.
2628
2729
## Prerequisites
2830

articles/connectors/connectors-native-webhook.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: ecfan
88
ms.author: estfan
99
ms.reviewer: klam, LADocs
1010
ms.topic: conceptual
11-
ms.date: 07/05/2019
11+
ms.date: 10/07/2019
1212
tags: connectors
1313
---
1414

@@ -33,6 +33,10 @@ An HTTP webhook action is also event-based and *subscribes* to a specific servic
3333

3434
For example, the Office 365 Outlook connector's [**Send approval email**](connectors-create-api-office365-outlook.md) action is an example of webhook action that follows this pattern. You can extend this pattern into any service by using the webhook action.
3535

36+
> [!NOTE]
37+
> Logic Apps enforces Transport Layer Security (TLS) 1.2 when
38+
> receiving the call back to the HTTP webhook trigger or action.
39+
3640
For more information, see these topics:
3741

3842
* [HTTP Webhook trigger parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-webhook-trigger)

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ To prevent others from changing or deleting your logic app, you can use [Azure R
181181

182182
## Access to run history data
183183

184-
During a logic app run, all the data is encrypted during transit by using [Transit Layer Security (TLS)](https://azure.microsoft.com/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions/) and at [rest](../security/fundamentals/encryption-atrest.md). When your logic app finishes running, you can view the history for that run, including the steps that ran along with the status, duration, inputs, and outputs for each action. This rich detail provides insight into how your logic app ran and where you might start troubleshooting any problems that arise.
184+
During a logic app run, all the data is encrypted during transit by using [Transport Layer Security (TLS)](https://azure.microsoft.com/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions/) and at [rest](../security/fundamentals/encryption-atrest.md). When your logic app finishes running, you can view the history for that run, including the steps that ran along with the status, duration, inputs, and outputs for each action. This rich detail provides insight into how your logic app ran and where you might start troubleshooting any problems that arise.
185185

186186
When you access your logic app's run history, Logic Apps authenticates your access and provides links to the inputs and outputs from the requests and responses in your logic app's run. However, for actions that handle any passwords, secrets, keys, or other sensitive information, you want to prevent others from viewing and accessing that data. For example, if your logic app gets a secret from [Azure Key Vault](../key-vault/key-vault-overview.md) to use when authenticating an HTTP action, you want to hide that secret from view.
187187

0 commit comments

Comments
 (0)