As we are aware security is the major constraint in cloud environment and we are being bit hesitant on how this is addressed and how could we control in accessing specific services or resources either in cloud or hybrid integration scenarios. So the first thing pop ups in our mind is restricting IP addresses on firewall for specific servers or ports for specific resources etc...
So, I just thought of throwing some light on how the Logic App IP addresses are categorized and used for various connectors. We can enlist only specific IP addresses required for specific resource and restrict access to others.
At the time of writing this article, Logic Apps can be deployed to both Shared or ISE (Integration Service Environment) which can be internal or external ISE. So, Shared environment has Azure multi-tenant IP addresses where in ISE will have your VNET subnet IP range and Shared environment IP's which is explained below.
Logic App IP's are broadly categorized as in screenshot below:
When we talk about ISE , the ISE LogicApp will have both Shared and VNet subnet IP addresses which will be used based on what type of connector we use in LogicApp.
We have two different types of connectors available as below.
Let's see how we can further classify the respective IP addresses for specific connector types.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.