Skip to content

Commit f80ac0c

Browse files
authored
Merge pull request #104822 from ecfan/request-oauth-support
Add updates for enabling Azure AD OAuth support in Request triggers
2 parents 347b4cf + 11baa27 commit f80ac0c

File tree

8 files changed

+159
-50
lines changed

8 files changed

+159
-50
lines changed

articles/connectors/connectors-native-reqres.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewers: klam, logicappspm
77
ms.topic: conceptual
8-
ms.date: 03/12/2020
8+
ms.date: 05/04/2020
99
tags: connectors
1010
---
1111

@@ -17,11 +17,15 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
1717
* Trigger a workflow when an external webhook event happens.
1818
* Receive and respond to an HTTPS call from another logic app.
1919

20+
The Request trigger supports [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to your logic app. For more information about enabling this authentication, see [Secure access and data in Azure Logic Apps - Enable Azure AD OAuth authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth).
21+
2022
> [!NOTE]
21-
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
22-
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23+
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls.
24+
> Outgoing calls support TLS 1.0, 1.1, and 1.2. For more information, see
25+
> [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
2326
>
24-
> If you see TLS handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
27+
> If you get TLS handshake errors, make sure that you use TLS 1.2.
28+
> For incoming calls, here are the supported cipher suites:
2529
>
2630
> * TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
2731
> * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
@@ -42,7 +46,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
4246

4347
## Add Request trigger
4448

45-
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app. For more information about the trigger's underlying JSON definition and how to call this trigger, see the [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
49+
This built-in trigger creates a manually callable HTTPS endpoint that can receive *only* incoming HTTPS requests. When this event happens, the trigger fires and runs the logic app.
4650

4751
1. Sign in to the [Azure portal](https://portal.azure.com). Create a blank logic app.
4852

@@ -173,13 +177,17 @@ This built-in trigger creates a manually callable HTTPS endpoint that can receiv
173177

174178
Your logic app keeps the incoming request open only for one minute. Assuming that your logic app workflow includes a Response action, if the logic app doesn't return a response after this time passes, your logic app returns a `504 GATEWAY TIMEOUT` to the caller. Otherwise, if your logic app doesn't include a Response action, your logic app immediately returns a `202 ACCEPTED` response to the caller.
175179

176-
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
180+
1. When you're done, save your logic app. On the designer toolbar, select **Save**.
177181

178182
This step generates the URL to use for sending the request that triggers the logic app. To copy this URL, select the copy icon next to the URL.
179183

180184
![URL to use triggering your logic app](./media/connectors-native-reqres/generated-url.png)
181185

182-
1. To trigger your logic app, send an HTTP POST to the generated URL. For example, you can use a tool such as [Postman](https://www.getpostman.com/).
186+
1. To trigger your logic app, send an HTTP POST to the generated URL.
187+
188+
For example, you can use a tool such as [Postman](https://www.getpostman.com/) to send the HTTP POST. If you [enabled Azure Active Directory Open Authentication](../logic-apps/logic-apps-securing-a-logic-app.md#enable-oauth) (Azure AD OAuth) for authorizing inbound calls to the Request trigger, either call the trigger by using a [Shared Access Signature (SAS) URL](../logic-apps/logic-apps-securing-a-logic-app.md#sas) or by using an authentication token, but you can't use both. The authentication token must specify the `Bearer` type in the authorization header. For more information, see [Secure access and data in Azure Logic Apps - Access to request-based-triggers](../logic-apps/logic-apps-securing-a-logic-app.md#secure-triggers).
189+
190+
For more information about the trigger's underlying JSON definition and how to call this trigger, see these topics, [Request trigger type](../logic-apps/logic-apps-workflow-actions-triggers.md#request-trigger) and [Call, trigger, or nest workflows with HTTP endpoints in Azure Logic Apps](../logic-apps/logic-apps-http-endpoint.md).
183191

184192
### Trigger outputs
185193

@@ -255,4 +263,4 @@ Your logic app keeps the incoming request open only for one minute. Assuming tha
255263

256264
## Next steps
257265

258-
* [Connectors for Logic Apps](../connectors/apis-list.md)
266+
* [Connectors for Logic Apps](../connectors/apis-list.md)
0 Bytes
Loading

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: jonfan, logicappspm
77
ms.topic: article
8-
ms.date: 04/17/2020
8+
ms.date: 05/04/2020
99
---
1010

1111
# Limits and configuration information for Azure Logic Apps
@@ -32,7 +32,6 @@ Here are the limits for a single logic app definition:
3232
| Length of `description` | 256 characters | |
3333
| Maximum `parameters` | 50 | |
3434
| Maximum `outputs` | 10 | |
35-
||||
3635

3736
<a name="run-duration-retention-limits"></a>
3837

@@ -151,8 +150,8 @@ Some connector operations make asynchronous calls or listen for webhook requests
151150

152151
| Name | Multi-tenant limit | Integration service environment limit | Notes |
153152
|------|--------------------|---------------------------------------|-------|
154-
| Message size | 100 MB | 200 MB | ISE-labeled connectors use the ISE limit, not their non-ISE connector limits. <p><p>To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. |
155-
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that either natively support chunking or let you enable chunking in their runtime configuration. <p><p>For the integration service environment, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information about chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
153+
| Message size | 100 MB | 200 MB | To work around this limit, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). However, some connectors and APIs might not support chunking or even the default limit. <p><p>- Connectors such as AS2, X12, and EDIFACT have their own [B2B message limits](#b2b-protocol-limits). <br>- ISE connectors use the ISE limit, not their non-ISE connector limits. |
154+
| Message size with chunking | 1 GB | 5 GB | This limit applies to actions that either natively support chunking or let you enable chunking in their runtime configuration. <p><p>If you're using an ISE, the Logic Apps engine supports this limit, but connectors have their own chunking limits up to the engine limit, for example, see the [Azure Blob Storage connector's API reference](https://docs.microsoft.com/connectors/azureblob/). For more information about chunking, see [Handle large messages with chunking](../logic-apps/logic-apps-handle-large-messages.md). |
156155
|||||
157156

158157
#### Character limits
@@ -174,6 +173,18 @@ Some connector operations make asynchronous calls or listen for webhook requests
174173
| Retry min delay | 5 seconds | To change the default, use the [retry policy parameter](../logic-apps/logic-apps-workflow-actions-triggers.md). |
175174
||||
176175

176+
<a name="authentication-limits"></a>
177+
178+
### Authentication limits
179+
180+
Here are the limits for a logic app that starts with a Request trigger and enables [Azure Active Directory Open Authentication](../active-directory/develop/about-microsoft-identity-platform.md) (Azure AD OAuth) for authorizing inbound calls to the Request trigger:
181+
182+
| Name | Limit | Notes |
183+
| ---- | ----- | ----- |
184+
| Azure AD authorization policies | 5 | |
185+
| Claims per authorization policy | 10 | |
186+
||||
187+
177188
<a name="custom-connector-limits"></a>
178189

179190
## Custom connector limits

0 commit comments

Comments
 (0)