You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/connectors/connectors-create-api-ftp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ You can use triggers that get responses from your FTP server and make the output
22
22
23
23
## Limitations
24
24
25
-
* The FTP connector supports only explicit FTP over SSL (FTPS) and isn't compatible with implicit FTPS.
25
+
* The FTP connector supports only explicit FTP over TLS/SSL (FTPS) and isn't compatible with implicit FTPS.
26
26
27
27
* By default, FTP actions can read or write files that are *50 MB or smaller*. To handle files larger than 50 MB, FTP actions support [message chunking](../logic-apps/logic-apps-handle-large-messages.md). The **Get file content** action implicitly uses chunking.
Copy file name to clipboardExpand all lines: articles/connectors/connectors-native-reqres.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ With [Azure Logic Apps](../logic-apps/logic-apps-overview.md) and the built-in R
21
21
> The Request trigger supports *only* Transport Layer Security (TLS) 1.2 for incoming calls. Outgoing calls
22
22
> continue to support TLS 1.0, 1.1, and 1.2. For more information, see [Solving the TLS 1.0 problem](https://docs.microsoft.com/security/solving-tls1-problem).
23
23
>
24
-
> If you see SSL handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
24
+
> If you see TLS handshake errors, make sure that you use TLS 1.2. For incoming calls, here are the supported cipher suites:
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ To control access and protect data in Azure Logic Apps, you can set up security
22
22
23
23
## Access to request-based triggers
24
24
25
-
If your logic app uses a request-based trigger, which receives incoming calls or requests, such as the [Request](../connectors/connectors-native-reqres.md) or [Webhook](../connectors/connectors-native-webhook.md) trigger, you can limit access so that only authorized clients can call your logic app. All requests received by a logic app are encrypted and secured with Secure Sockets Layer (SSL) protocol.
25
+
If your logic app uses a request-based trigger, which receives incoming calls or requests, such as the [Request](../connectors/connectors-native-reqres.md) or [Webhook](../connectors/connectors-native-webhook.md) trigger, you can limit access so that only authorized clients can call your logic app. All requests received by a logic app are encrypted and secured with Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), protocol.
26
26
27
27
Here are options that can help you secure access to this trigger type:
28
28
@@ -659,7 +659,7 @@ If the [Client Certificate](../active-directory/authentication/active-directory-
|**Authentication**|`type`| Yes |**Client Certificate** <br>or <br>`ClientCertificate`| The authentication type to use for Secure Sockets Layer (SSL) client certificates. While self-signed certificates are supported, self-signed certificates for SSL aren't supported. |
662
+
|**Authentication**|`type`| Yes |**Client Certificate** <br>or <br>`ClientCertificate`| The authentication type to use for TLS/SSL client certificates. While self-signed certificates are supported, self-signed certificates for TLS/SSL aren't supported. |
663
663
|**Pfx**|`pfx`| Yes | <*encoded-pfx-file-content*> | The base64-encoded content from a Personal Information Exchange (PFX) file <p><p>To convert the PFX file into base64-encoded format, you can use PowerShell by following these steps: <p>1. Save the certificate content into a variable: <p> `$pfx_cert = get-content 'c:\certificate.pfx' -Encoding Byte` <p>2. Convert the certificate content by using the `ToBase64String()` function and save that content to a text file: <p> `[System.Convert]::ToBase64String($pfx_cert) | Out-File 'pfx-encoded-bytes.txt'` |
664
664
|**Password**|`password`| No | <*password-for-pfx-file*> | The password for accessing the PFX file |
665
665
|||||
@@ -688,7 +688,7 @@ For more information about securing services by using client certificate authent
688
688
*[Improve security for back-end services by using client certificate authentication in Azure API Management](../api-management/api-management-howto-mutual-certificates.md)
689
689
*[Improve security for your RESTfuL service by using client certificates](../active-directory-b2c/secure-rest-api.md)
690
690
*[Certificate credentials for application authentication](../active-directory/develop/active-directory-certificate-credentials.md)
691
-
*[Use an SSL certificate in your application code in Azure App Service](../app-service/configure-ssl-certificate-in-code.md)
691
+
*[Use a TLS/SSL certificate in your code in Azure App Service](../app-service/configure-ssl-certificate-in-code.md)
0 commit comments