You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Message size | 100 MB | 200 MB | To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. |
153
152
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that natively support chunking or let you enable chunking in their runtime configuration. <p>For the integration service environment, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
154
-
|||||
153
+
|||||
155
154
156
155
#### Character limits
157
156
@@ -170,6 +169,18 @@ Some connector operations make asynchronous calls or listen for webhook requests
170
169
| Retry min delay | 5 seconds | To change the default, use the [retry policy parameter](../logic-apps/logic-apps-workflow-actions-triggers.md). |
171
170
||||
172
171
172
+
<aname="authentication-limits"></a>
173
+
174
+
### Authentication limits
175
+
176
+
Here are the limits for a logic app that starts with a Request trigger and enables [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger:
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,15 +96,15 @@ In the body, include the `KeyType` property as either `Primary` or `Secondary`.
96
96
97
97
If your logic app starts with a Request trigger, you can enable [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger. Before you enable this authentication, review these considerations:
98
98
99
-
* Your logic app can have up to five authorization policies. Each authorization policy can have up to 10 [claims](../active-directory/develop/developer-glossary.md#claim).
99
+
* Your logic app is limited to a maximum number of authorization policies. Each authorization policy also has a maximum number of [claims](../active-directory/develop/developer-glossary.md#claim). For more information, see [Limits and configuration for Azure Logic Apps](../logic-apps/logic-apps-limits-and-config.md#authentication-limits).
100
100
101
101
* An authorization policy must include at least the **Issuer** claim, which has a value that starts with `https://sts.windows.net/` as the Azure AD issuer ID.
102
102
103
-
*Your logic app can't use both Azure AD OAuth and[Shared Access Signatures (SAS)](#sas) authorization schemes.
103
+
*An inbound call to your logic app can use only one authorization scheme, either Azure AD OAuth or[Shared Access Signatures (SAS)](#sas).
104
104
105
-
* OAuth tokens are supported only for workflow trigger requests.
105
+
* OAuth tokens are supported only for the Request trigger.
106
106
107
-
* Only Bearer-type authorization schemes are supported for OAuth tokens.
107
+
* Only [Bearer-type](../active-directory/develop/active-directory-v2-protocols.md#tokens) authorization schemes are supported for OAuth tokens.
108
108
109
109
To enable Azure AD OAuth, follow these steps to add one or more authorization policies to your logic app.
0 commit comments