Hi Suki Azure,
To ensure seamless connectivity between the Azure VM, Power Automate/Power Platform services, Microsoft 365 services, SAP Ariba, and certificate revocation list (CRL) endpoints, specific inbound and outbound ports and endpoints must be configured in the Azure VM's network security group (NSG) and any corporate firewalls.
Ensure that you have added the required URLs to the allow list to ensure communication through firewalls and other security mechanisms. If you can't access a service or specific URLs fail to load, a proxy or firewall might be configured to prevent you from accessing server resources. Review your proxy settings and ensure that you add all the relevant URLs to the allowed list as per your service.
Endpoints:
- *.api.powerplatform.com (Power Platform APIs)
- *.flow.microsoft.com (Power Automate services)
- config.edge.skype.com (Microsoft 365 Enhanced Configuration Service, required for authentication)
- *.microsoftonline.com (Microsoft Entra ID authentication)
- *.azure-automation.net (if using Azure Automation for additional management) Please refer to this document for additional information:https://learn.microsoft.com/en-us/power-automate/ip-address-configuration#required-services Outbound: TCP 443 (HTTPS) for secure communication with Power Platform services.
The following table in the document lists the services to which Power Automate connects. Ensure none of these services is blocked on your network.https://learn.microsoft.com/en-us/power-automate/ip-address-configuration#use-the-power-automate-web-portal
SAP Ariba is a cloud-based service, and specific endpoints depend on your Ariba realm. Common domains include:
- *.ariba.com
- *.s1.ariba.com (or region-specific domains like *.eu.ariba.com for Europe)
- Contact your SAP Ariba administrator or refer to SAP Ariba's documentation for your specific realm's endpoints (e.g., via SAP Ariba Connect or support).https://support.ariba.com/item/view/KB0550099
- Since you're not using APIs, Power Automate Desktop will interact with SAP Ariba's web interface via browser automation (e.g., Edge or Chrome). Ensure the browser on the VM can access Ariba without network restrictions. Note: If you use an Azure virtual machine (VM) to run Power Automate for desktop, make sure the Microsoft.ServiceBus endpoint is turned off at the subnet level where the Azure VM is located. This is a known limitation. For more information, see Azure Relay doesn't support network service endpoints.
Certificate Revocation List (CRL) and Authentication Endpoints.
Domain vs. Local Account
- Preferred: Domain-joined service account for central policy and password management.
- Accepted: Local account with admin rights on the VM (must be used consistently for agent registration).
https://learn.microsoft.com/en-us/microsoft-365-apps/licensing-activation/overview-unattended
This article presents all the prerequisites and limitations you should consider before installing and using Power Automate on your desktop.
https://learn.microsoft.com/en-us/power-automate/desktop-flows/requirements
https://learn.microsoft.com/en-us/power-automate/desktop-flows/manage-machine-groups
Validate Desktop Flow Agent Connectivity: On the Azure VM (logged in as service account):
- Open Power Automate Desktop
- Check Machine Status (should show “Connected”)
- Use
Test Connection
from the Power Automate Portal > Machines
Log location (on VM): C:\ProgramData\Microsoft\Power Automate Desktop\Logs\
Hope it helps!
Let me know if you have any further queries!
If the information is helpful, please click "upvote" to let us know!