You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-reqres.md
+16-8Lines changed: 16 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewers: klam, logicappspm
7
7
ms.topic: conceptual
8
-
ms.date: 03/12/2020
8
+
ms.date: 05/04/2020
9
9
tags: connectors
10
10
---
11
11
@@ -17,11 +17,15 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
17
17
* Trigger a workflow when an external webhook event happens.
18
18
* Receive and respond to an HTTPS call from another logic app.
19
19
20
+
The Request trigger supports [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to your logic app. For more information about enabling this authentication, see [Secure access and data in Azure Logic Apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
21
+
20
22
> [!NOTE]
21
-
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
22
-
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23
+
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls.
24
+
> Outgoing calls support TLS 1.0, 1.1, and 1.2. For more information, see
25
+
> [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23
26
>
24
-
> If you see TLS handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
27
+
> If you get TLS handshake errors, make sure that you use TLS 1.2.
28
+
> For incoming calls, here are the supported cipher suites:
25
29
>
26
30
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
27
31
> * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
@@ -42,7 +46,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
42
46
43
47
## Add Request trigger
44
48
45
-
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app. For more information about the trigger's underlying JSON definition and how to call this trigger, see the [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
49
+
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app.
46
50
47
51
1. Sign in to the [Azure portal](https://portal.azure.com). Create a blank logic app.
48
52
@@ -173,13 +177,17 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
173
177
174
178
Your logic app keeps the incoming request open only for one minute. Assuming that your logic app workflow includes a Response action, if the logic app doesn't return a response after this time passes, your logic app returns a `504 GATEWAY TIMEOUT` to the caller. Otherwise, if your logic app doesn't include a Response action, your logic app immediately returns a `202 ACCEPTED` response to the caller.
175
179
176
-
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
180
+
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
177
181
178
182
This step generates the URL to use for sending the request that triggers the logic app. To copy this URL, select the copy icon next to the URL.
179
183
180
184

181
185
182
-
1. To trigger your logic app, send an HTTP POST to the generated URL. For example, you can use a tool such as [Postman](https://www.getpostman.com/).
186
+
1. To trigger your logic app, send an HTTP POST to the generated URL.
187
+
188
+
For example, you can use a tool such as [Postman](https://www.getpostman.com/) to send the HTTP POST. If you [enabled Azure Active Directory Open Authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth) (Azure AD OAuth) for authorizing inbound calls to the Request trigger, either call the trigger by using a [Shared Access Signature (SAS) URL](../logic-apps/logic-apps-securing-a-logic-app.md#sas) or by using an authentication token, but you can't use both. The authentication token must specify the `Bearer` type in the authorization header. For more information, see [Secure access and data in Azure Logic Apps - Access to request-based-triggers](../logic-apps/logic-apps-securing-a-logic-app.md#secure-triggers).
189
+
190
+
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
183
191
184
192
### Trigger outputs
185
193
@@ -255,4 +263,4 @@ Your logic app keeps the incoming request open only for one minute. Assuming tha
255
263
256
264
## Next steps
257
265
258
-
* [Connectors for Logic Apps](../connectors/apis-list.md)
266
+
* [Connectors for Logic Apps](../connectors/apis-list.md)
| Message size | 100 MB | 200 MB |ISE-labeled connectors use the ISE limit, not their non-ISE connector limits. <p><p>To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. |
155
-
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that either natively support chunking or let you enable chunking in their runtime configuration. <p><p>For the integration service environment, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information about chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
153
+
| Message size | 100 MB | 200 MB | To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. <p><p>- Connectors such as AS2, X12, and EDIFACT have their own [B2B message limits](#b2b-protocol-limits). <br>- ISE connectors use the ISE limit, not their non-ISE connector limits. |
154
+
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that either natively support chunking or let you enable chunking in their runtime configuration. <p><p>If you're using an ISE, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information about chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
156
155
|||||
157
156
158
157
#### Character limits
@@ -174,6 +173,18 @@ Some connector operations make asynchronous calls or listen for webhook requests
174
173
| Retry min delay | 5 seconds | To change the default, use the [retry policy parameter](../logic-apps/logic-apps-workflow-actions-triggers.md). |
175
174
||||
176
175
176
+
<aname="authentication-limits"></a>
177
+
178
+
### Authentication limits
179
+
180
+
Here are the limits for a logic app that starts with a Request trigger and enables [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger:
0 commit comments