Skip to content

Commit ffb41ac

Browse files
author
ecfan
committed
Fix link issues
1 parent 72ea819 commit ffb41ac

File tree

1 file changed

+16
-18
lines changed

1 file changed

+16
-18
lines changed

articles/logic-apps/logic-apps-securing-a-logic-app.md

Lines changed: 16 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ To specify the allowed IP ranges, follow these steps for your Consumption or Sta
9595

9696
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
9797

98-
1. On your logic app's menu, under **Settings**, select **Workflow settings**.
98+
1. On the logic app menu, under **Settings**, select **Workflow settings**.
9999

100100
1. In the **Access control configuration** section, under **Allowed inbound IP addresses**, from the **Trigger access option** list, select **Specific IP ranges**.
101101

@@ -695,7 +695,7 @@ In Consumption workflows, inbound calls to a request-based trigger endpoint can
695695
For more information about using SAS, see the following later sections in this guide:
696696

697697
* [Regenerate access keys](#regenerate-access-keys)
698-
* [Create expiring callback URLs](#expiring-urls)
698+
* [Create expiring callback URLs](#expiring-callback-urls)
699699
* [Create URLs with primary or secondary key](#primary-secondary-key)
700700

701701
<a name="disable-sas"></a>
@@ -726,7 +726,7 @@ For this task, you'll need a tool to send REST API calls, for example:
726726

727727
#### Add the sasAuthenticationPolicy property to your workflow definition
728728

729-
1. With your tool that sends REST API calls, get information about your workflow by running the [**Workflows - Get** operation](/rest/api/logic/workflows/get&tabs=HTTP) with the following **GET** request:
729+
1. With your tool that sends REST API calls, get information about your workflow by running the [**Workflows - Get** operation](/rest/api/logic/workflows/get) with the following **GET** request:
730730

731731
**`GET https://management.azure.com/subscriptions/{subscription-ID}/resourceGroups/{resource-group-name}/providers/Microsoft.Logic/workflows/{workflow-name}?api-version=2016-06-01`**
732732

@@ -739,14 +739,14 @@ For this task, you'll need a tool to send REST API calls, for example:
739739
When you finish, your updated output looks like the following example:
740740

741741
```json
742-
"properties": {
743-
"accessControl": {
744-
"triggers": {
745-
"sasAuthenticationPolicy": {
746-
"state": "Disabled"
747-
}
748-
}
749-
}
742+
"properties": {
743+
"accessControl": {
744+
"triggers": {
745+
"sasAuthenticationPolicy": {
746+
"state": "Disabled"
747+
}
748+
}
749+
}
750750
}
751751
```
752752

@@ -772,7 +772,7 @@ To generate a new security access key at any time, use the Azure REST API or Azu
772772

773773
1. Select the key that you want to regenerate and finish the process.
774774

775-
<a name="expiring-urls"></a>
775+
<a name="expiring-callback-urls"></a>
776776

777777
### Create expiring callback URLs
778778

@@ -797,7 +797,7 @@ POST /subscriptions/<Azure-subscription-ID>/resourceGroups/<Azure-resource-group
797797
In the body, include the `KeyType` property as either `Primary` or `Secondary`. This property returns a URL that's signed by the specified security key.
798798

799799
<a name="enable-oauth"></a>
800-
<a name='enable-azure-active-directory-open-authentication-azure-ad-oauth'></a>
800+
<a name="enable-azure-active-directory-open-authentication-azure-ad-oauth"></a>
801801

802802
### Enable Open Authorization with Microsoft Entra ID (Microsoft Entra ID OAuth)
803803

@@ -807,7 +807,7 @@ When your logic app workflow receives an inbound request that includes an OAuth
807807

808808
In a Standard logic app workflow that starts with the **Request trigger** (but not a webhook trigger), you can use the Azure Functions provision for authenticating inbound calls sent to the endpoint created by that trigger by using a managed identity. This provision is also known as "**Easy Auth**". For more information, review [Trigger workflows in Standard logic apps with Easy Auth](https://techcommunity.microsoft.com/t5/integrations-on-azure-blog/trigger-workflows-in-standard-logic-apps-with-easy-auth/ba-p/3207378).
809809

810-
<a name='considerations-before-you-enable-azure-ad-oauth'></a>
810+
<a name="considerations-before-you-enable-azure-ad-oauth"></a>
811811

812812
#### Considerations before you enable Microsoft Entra ID OAuth
813813

@@ -900,8 +900,7 @@ The Microsoft Authentication Library (MSAL) libraries provide PoP tokens for you
900900
To use the PoP token with your Consumption logic app workflow, follow the next section to [set up OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
901901

902902
<a name="enable-azure-ad-inbound"></a>
903-
904-
<a name='enable-azure-ad-oauth-for-your-consumption-logic-app-resource'></a>
903+
<a name="enable-azure-ad-oauth-for-your-consumption-logic-app-resource"></a>
905904

906905
#### Enable Microsoft Entra ID OAuth for your Consumption logic app resource
907906

@@ -1500,8 +1499,7 @@ For more information about securing services by using client certificate authent
15001499
* [Use a TLS/SSL certificate in your code in Azure App Service](../app-service/configure-ssl-certificate-in-code.md)
15011500

15021501
<a name="azure-active-directory-oauth-authentication"></a>
1503-
1504-
<a name='azure-active-directory-open-authentication'></a>
1502+
<a name="azure-active-directory-open-authentication"></a>
15051503

15061504
#### Microsoft identity platform
15071505

0 commit comments

Comments
 (0)