Skip to content

Commit f19cd17

Browse files
author
ecfan
committed
Fix table formatting
1 parent 0c7487a commit f19cd17

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,6 @@ This example template that has multiple secured parameter definitions that use t
455455
| `TemplateUsernameParam` | A template parameter that accepts a username that is then passed to the workflow definition's `basicAuthUserNameParam` parameter |
456456
| `basicAuthPasswordParam` | A workflow definition parameter that accepts the password for basic authentication in an HTTP action |
457457
| `basicAuthUserNameParam` | A workflow definition parameter that accepts the username for basic authentication in an HTTP action |
458-
|||
459458

460459
```json
461460
{
@@ -645,7 +644,6 @@ Each URL contains the `sp`, `sv`, and `sig` query parameter as described in this
645644
| `sp` | Specifies permissions for the allowed HTTP methods to use. |
646645
| `sv` | Specifies the SAS version to use for generating the signature. |
647646
| `sig` | Specifies the signature to use for authenticating access to the trigger. This signature is generated by using the SHA256 algorithm with a secret access key on all the URL paths and properties. This key is kept encrypted, stored with the logic app, and is never exposed or published. Your logic app authorizes only those triggers that contain a valid signature created with the secret key. |
648-
|||
649647

650648
Inbound calls to a request endpoint can use only one authorization scheme, either SAS or [OAuth with Microsoft Entra ID](#enable-oauth). Although using one scheme doesn't disable the other scheme, using both schemes at the same time causes an error because the service doesn't know which scheme to choose.
651649

0 commit comments

Comments
 (0)