Skip to content

Commit cda4ee2

Browse files
authored
Updates per feedback
1 parent 42f91ce commit cda4ee2

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ If you want your logic app to trigger only as a nested logic app, from the **All
207207
208208
#### Restrict inbound IP ranges in Azure Resource Manager template
209209

210-
If you [automate deployment for logic apps by using Resource Manager templates](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can specify the IP ranges by using the `accessControl` section with the `triggers` section in your logic app's resource definition, for example:
210+
If you [automate deployment for logic apps by using Resource Manager templates](../logic-apps/logic-apps-azure-resource-manager-templates-overview.md), you can specify the IP ranges in *x.x.x.x/x* or *x.x.x.x-x.x.x.x* format by using the `accessControl` section and by including the `triggers` and `actions` sections in your logic app's resource definition, for example:
211211

212212
```json
213213
{
@@ -235,9 +235,6 @@ If you [automate deployment for logic apps by using Resource Manager templates](
235235
"allowedCallerIpAddresses": [
236236
{
237237
"addressRange": "192.168.12.0/23"
238-
},
239-
{
240-
"addressRange": "2001:0db8::/64"
241238
}
242239
]
243240
},

0 commit comments

Comments
 (0)