You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-securing-a-logic-app.md
+16-18Lines changed: 16 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,7 +95,7 @@ To specify the allowed IP ranges, follow these steps for your Consumption or Sta
95
95
96
96
1. In the [Azure portal](https://portal.azure.com), open your Consumption logic app workflow in the designer.
97
97
98
-
1. On your logic app's menu, under **Settings**, select **Workflow settings**.
98
+
1. On the logic app menu, under **Settings**, select **Workflow settings**.
99
99
100
100
1. In the **Access control configuration** section, under **Allowed inbound IP addresses**, from the **Trigger access option** list, select **Specific IP ranges**.
101
101
@@ -695,7 +695,7 @@ In Consumption workflows, inbound calls to a request-based trigger endpoint can
695
695
For more information about using SAS, see the following later sections in this guide:
*[Create URLs with primary or secondary key](#primary-secondary-key)
700
700
701
701
<aname="disable-sas"></a>
@@ -726,7 +726,7 @@ For this task, you'll need a tool to send REST API calls, for example:
726
726
727
727
#### Add the sasAuthenticationPolicy property to your workflow definition
728
728
729
-
1. With your tool that sends REST API calls, get information about your workflow by running the [**Workflows - Get** operation](/rest/api/logic/workflows/get&tabs=HTTP) with the following **GET** request:
729
+
1. With your tool that sends REST API calls, get information about your workflow by running the [**Workflows - Get** operation](/rest/api/logic/workflows/get) with the following **GET** request:
@@ -739,14 +739,14 @@ For this task, you'll need a tool to send REST API calls, for example:
739
739
When you finish, your updated output looks like the following example:
740
740
741
741
```json
742
-
"properties": {
743
-
"accessControl": {
744
-
"triggers": {
745
-
"sasAuthenticationPolicy": {
746
-
"state": "Disabled"
747
-
}
748
-
}
749
-
}
742
+
"properties": {
743
+
"accessControl": {
744
+
"triggers": {
745
+
"sasAuthenticationPolicy": {
746
+
"state": "Disabled"
747
+
}
748
+
}
749
+
}
750
750
}
751
751
```
752
752
@@ -772,7 +772,7 @@ To generate a new security access key at any time, use the Azure REST API or Azu
772
772
773
773
1. Select the key that you want to regenerate and finish the process.
774
774
775
-
<aname="expiring-urls"></a>
775
+
<aname="expiring-callback-urls"></a>
776
776
777
777
### Create expiring callback URLs
778
778
@@ -797,7 +797,7 @@ POST /subscriptions/<Azure-subscription-ID>/resourceGroups/<Azure-resource-group
797
797
In the body, include the `KeyType` property as either `Primary` or `Secondary`. This property returns a URL that's signed by the specified security key.
### Enable Open Authorization with Microsoft Entra ID (Microsoft Entra ID OAuth)
803
803
@@ -807,7 +807,7 @@ When your logic app workflow receives an inbound request that includes an OAuth
807
807
808
808
In a Standard logic app workflow that starts with the **Request trigger** (but not a webhook trigger), you can use the Azure Functions provision for authenticating inbound calls sent to the endpoint created by that trigger by using a managed identity. This provision is also known as "**Easy Auth**". For more information, review [Trigger workflows in Standard logic apps with Easy Auth](https://techcommunity.microsoft.com/t5/integrations-on-azure-blog/trigger-workflows-in-standard-logic-apps-with-easy-auth/ba-p/3207378).
#### Considerations before you enable Microsoft Entra ID OAuth
813
813
@@ -900,8 +900,7 @@ The Microsoft Authentication Library (MSAL) libraries provide PoP tokens for you
900
900
To use the PoP token with your Consumption logic app workflow, follow the next section to [set up OAuth with Microsoft Entra ID](#enable-azure-ad-inbound).
0 commit comments