Skip to content

Commit d0dfdbb

Browse files
committed
Updates per PM feedback
1 parent e94c5b5 commit d0dfdbb

File tree

2 files changed

+17
-6
lines changed

2 files changed

+17
-6
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ Here are the limits for a single logic app definition:
3232
| Length of `description` | 256 characters | |
3333
| Maximum `parameters` | 50 | |
3434
| Maximum `outputs` | 10 | |
35-
||||
3635

3736
<a name="run-duration-retention-limits"></a>
3837

@@ -151,7 +150,7 @@ Some connector operations make asynchronous calls or listen for webhook requests
151150
|------|--------------------|---------------------------------------|-------|
152151
| Message size | 100 MB | 200 MB | To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. |
153152
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that natively support chunking or let you enable chunking in their runtime configuration. <p>For the integration service environment, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
154-
|||||
153+
|||||
155154

156155
#### Character limits
157156

@@ -170,6 +169,18 @@ Some connector operations make asynchronous calls or listen for webhook requests
170169
| Retry min delay | 5 seconds | To change the default, use the [retry policy parameter](../logic-apps/logic-apps-workflow-actions-triggers.md). |
171170
||||
172171

172+
<a name="authentication-limits"></a>
173+
174+
### Authentication limits
175+
176+
Here are the limits for a logic app that starts with a Request trigger and enables [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger:
177+
178+
| Name | Limit | Notes |
179+
| ---- | ----- | ----- |
180+
| Azure AD authorization policies | 5 | |
181+
| Claims per authorization policy | 10 | |
182+
||||
183+
173184
<a name="custom-connector-limits"></a>
174185

175186
## Custom connector limits

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -96,15 +96,15 @@ In the body, include the `KeyType` property as either `Primary` or `Secondary`.
9696

9797
If your logic app starts with a Request trigger, you can enable [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger. Before you enable this authentication, review these considerations:
9898

99-
* Your logic app can have up to five authorization policies. Each authorization policy can have up to 10 [claims](../active-directory/develop/developer-glossary.md#claim).
99+
* Your logic app is limited to a maximum number of authorization policies. Each authorization policy also has a maximum number of [claims](../active-directory/develop/developer-glossary.md#claim). For more information, see [Limits and configuration for Azure Logic Apps](../logic-apps/logic-apps-limits-and-config.md#authentication-limits).
100100

101101
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with `https://sts.windows.net/` as the Azure AD issuer ID.
102102

103-
* Your logic app can't use both Azure AD OAuth and [Shared Access Signatures (SAS)](#sas) authorization schemes.
103+
* An inbound call to your logic app can use only one authorization scheme, either Azure AD OAuth or [Shared Access Signatures (SAS)](#sas).
104104

105-
* OAuth tokens are supported only for workflow trigger requests.
105+
* OAuth tokens are supported only for the Request trigger.
106106

107-
* Only Bearer-type authorization schemes are supported for OAuth tokens.
107+
* Only [Bearer-type](../active-directory/develop/active-directory-v2-protocols.md#tokens) authorization schemes are supported for OAuth tokens.
108108

109109
To enable Azure AD OAuth, follow these steps to add one or more authorization policies to your logic app.
110110

0 commit comments

Comments
 (0)