Skip to content

Commit d722370

Browse files
authored
Merge pull request #90915 from ecfan/tls
Add Transport Layer Security version info
2 parents 681279a + a6d4053 commit d722370

File tree

3 files changed

+15
-8
lines changed

3 files changed

+15
-8
lines changed

articles/connectors/connectors-native-reqres.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.author: estfan
99
ms.reviewers: klam, LADocs
1010
manager: carmonm
1111
ms.assetid: 566924a4-0988-4d86-9ecd-ad22507858c0
12-
ms.topic: article
13-
ms.date: 09/06/2019
12+
ms.topic: conceptual
13+
ms.date: 10/11/2019
1414
tags: connectors
1515
---
1616

@@ -22,7 +22,9 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
2222
* Trigger a workflow when an external webhook event happens.
2323
* Receive and respond to an HTTPS call from another logic app.
2424

25-
The Request trigger supports *only* HTTPS. To make outgoing HTTP or HTTPS calls instead, use the built-in [HTTP trigger or action](../connectors/connectors-native-http.md).
25+
> [!NOTE]
26+
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
27+
> continue to support TLS 1.0, 1.1, and 1.2. If you see SSL handshake errors, make sure that you use TLS 1.2.
2628
2729
## Prerequisites
2830

articles/connectors/connectors-native-webhook.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: Create event-based tasks and workflows in Azure Logic Apps
3-
description: Trigger, pause, and resume automated tasks, processes, and workflows based on events that happen at an endpoint by using Azure Logic Apps
2+
title: Wait and respond to events - Azure Logic Apps
3+
description: Automate workflows that trigger, pause, and resume based on events at a service endpoint by using Azure Logic Apps
44
services: logic-apps
55
ms.service: logic-apps
66
ms.suite: integration
77
author: ecfan
88
ms.author: estfan
99
ms.reviewer: klam, LADocs
1010
ms.topic: conceptual
11-
ms.date: 07/05/2019
11+
ms.date: 10/10/2019
1212
tags: connectors
1313
---
1414

15-
# Automate event-based tasks and workflows by using HTTP webhooks in Azure Logic Apps
15+
# Create and run automated event-based workflows by using HTTP webhooks in Azure Logic Apps
1616

1717
With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in HTTP Webhook connector, you can automate workflows that wait and run based on specific events that happen at an HTTP or HTTPS endpoint by building logic apps. For example, you can create a logic app that monitors a service endpoint by waiting for a specific event before triggering the workflow and running the specified actions, rather than regularly checking or *polling* that endpoint.
1818

@@ -33,6 +33,11 @@ An HTTP webhook action is also event-based and *subscribes* to a specific servic
3333

3434
For example, the Office 365 Outlook connector's [**Send approval email**](connectors-create-api-office365-outlook.md) action is an example of webhook action that follows this pattern. You can extend this pattern into any service by using the webhook action.
3535

36+
> [!NOTE]
37+
> Logic Apps enforces Transport Layer Security (TLS) 1.2 when
38+
> receiving the call back to the HTTP webhook trigger or action.
39+
> If you see SSL handshake errors, make sure that you use TLS 1.2.
40+
3641
For more information, see these topics:
3742

3843
* [HTTP Webhook trigger parameters](../logic-apps/logic-apps-workflow-actions-triggers.md#http-webhook-trigger)

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ To prevent others from changing or deleting your logic app, you can use [Azure R
181181

182182
## Access to run history data
183183

184-
During a logic app run, all the data is encrypted during transit by using [Transit Layer Security (TLS)](https://azure.microsoft.com/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions/) and at [rest](../security/fundamentals/encryption-atrest.md). When your logic app finishes running, you can view the history for that run, including the steps that ran along with the status, duration, inputs, and outputs for each action. This rich detail provides insight into how your logic app ran and where you might start troubleshooting any problems that arise.
184+
During a logic app run, all the data is encrypted during transit by using [Transport Layer Security (TLS)](https://azure.microsoft.com/updates/app-service-and-functions-hosted-apps-can-now-update-tls-versions/) and at [rest](../security/fundamentals/encryption-atrest.md). When your logic app finishes running, you can view the history for that run, including the steps that ran along with the status, duration, inputs, and outputs for each action. This rich detail provides insight into how your logic app ran and where you might start troubleshooting any problems that arise.
185185

186186
When you access your logic app's run history, Logic Apps authenticates your access and provides links to the inputs and outputs from the requests and responses in your logic app's run. However, for actions that handle any passwords, secrets, keys, or other sensitive information, you want to prevent others from viewing and accessing that data. For example, if your logic app gets a secret from [Azure Key Vault](../key-vault/key-vault-overview.md) to use when authenticating an HTTP action, you want to hide that secret from view.
187187

0 commit comments

Comments
 (0)