Skip to content

Commit c4fb3eb

Browse files
committed
Resolve conflict
2 parents 9407948 + ad036b4 commit c4fb3eb

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

articles/logic-apps/block-connections-across-tenants.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,9 @@ ms.date: 08/01/2022
1717
1818
Azure Logic Apps includes many connectors for you to build integration apps and workflows and to access various data, apps, services, systems, and other resources. These connectors authorize your access to these resources by using Azure Active Directory (Azure AD) to authenticate your credentials.
1919

20-
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Azure AD tenant or different tenant by sending a consent link. This shared connection provides access to same resource. However, this capability creates a security vulnerability. Anyone in other Azure AD tenants can create a logic app workflow with a connection. They can then share that connection's consent link with anyone else in a different tenant, for example, by sending a phishing email. If the receiver signs in using the shared connection, the sender can now access the resources in recipient's tenant.
20+
When you create a connection from your workflow to access a resource, you can share that connection with others in the same Azure AD tenant or different tenant by sending a consent link. This shared connection provides access to same resource but creates a security vulnerability.
2121

22-
To prevent this scenario, you can block access to and from your own Azure AD tenant through shared connections. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Azure AD authorized access.
22+
As a security measure to prevent this scenario, you can block access to and from your own Azure AD tenant through such shared connections. You can also permit but restrict connections only to specific tenants. By setting up a tenant isolation policy, you can better control data movement between your tenant and resources that require Azure AD authorized access.
2323

2424
## Prerequisites
2525

@@ -37,13 +37,15 @@ To prevent this scenario, you can block access to and from your own Azure AD ten
3737

3838
For example, some legacy connections might not have an associated tenant ID. So, you have to choose whether to block or allow such connections.
3939

40-
- The choice whether to initially enable or disable the isolation policy.
40+
- The choice whether to enable or disable the isolation policy.
4141

4242
- The tenant IDs for any tenants where you want to allow connections to or from your tenant.
4343

44-
- The choice whether to allow inbound connections to your tenant from each allowed tenant.
44+
If you choose to allow such connections, include the following information:
45+
46+
- The choice whether to allow inbound connections to your tenant from each allowed tenant.
4547

46-
- The choice whether to allow inbound connections from your tenant to each allowed tenant.
48+
- The choice whether to allow inbound connections from your tenant to each allowed tenant.
4749

4850
- To test the tenant isolation policy, you need a second Azure AD tenant. From this tenant, you'll try connecting to and from the isolated tenant after the isolation policy takes effect.
4951

0 commit comments

Comments
 (0)