Share via

SFTP (Built-In) Connection from Azure Logic App Error

VijAz 161 Reputation points
2026-02-19T21:38:08.8833333+00:00

What we are trying to do is create a workflow action "Upload file content" which takes me to fill in details as below using sftp server , username and password and port, but no luck

User's image

What we did is below:

  1. VNET Integration to logic app
  2. Added a NAT Gateway and whitelisted NAT Gateway IP (Public IP addresses)
  3. SFTP Connection fails and also cannot see any trace network side

Still we are not able to create a workflow action. Please advice what is missing.

Azure Logic Apps
Azure Logic Apps

An Azure service that automates the access and use of data across clouds without writing code.

{count} votes

2 answers

Sort by: Most helpful
  1. VijAz 161 Reputation points
    2026-02-24T21:59:05.56+00:00

    SFTP Builtin connector worked with whitelisting only NAT Gateway. Earlier we had misconfigured or not properly configured whitelisting. Corrected it and it worked.

    0 comments No comments

  2. Siddhesh Desai 4,025 Reputation points Microsoft External Staff Moderator
    2026-02-20T01:15:55.83+00:00

    Hi @VijAz

    Thank you for reaching out to Microsoft Q&A.

    In order to resolve this issue, Refer the solution below:

    Whitelist Azure Logic Apps outbound IPs (official but broad)

    You must whitelist Azure Logic Apps outbound IP ranges for your region, not the NAT Gateway IP.

    Microsoft publishes these ranges, and this is the only supported way for SFTP (Built‑In)

    Downsides:

    Large IP list

    Changes over time

    Often rejected by security teams

    Refer this document to troubleshoot same error: https://learn.microsoft.com/en-us/connectors/sftpwithssh/#504-error-a-connection-attempt-failed-because-the-connected-party-did-not-properly-respond-after-a-period-of-time-or-established-connection-failed-because-connected-host-has-failed-to-respond-or-request-to-the-sftp-server-has-taken-more-than-000030-seconds

    Instead of using SFTP Built in connector use SFTP SSH managed connector: https://learn.microsoft.com/en-us/azure/connectors/connectors-sftp-ssh?tabs=consumption

    This connector:

    Has more predictable outbound behavior

    Is commonly used when IP whitelisting is required

    Still uses Azure service IPs (not NAT), but works reliably when whitelisted correctly

    Enterprise‑grade fix (single outbound IP)

    If your requirement is one fixed outbound IP:

    Architecture

    Logic App > Azure Function (VNET + NAT) > SFTP

    Azure Function honors NAT Gateway

    Single static outbound IP

    Full SSH control, logging, retries

    Widely used workaround in locked‑down environments The SFTP‑SSH (Managed) connector is fully managed by Microsoft and is not deprecated (only the older “SFTP managed” connector is deprecated). With this connector, Microsoft handles networking, scaling, and outbound connectivity. If your SFTP server is publicly accessible, it may work without any additional whitelisting, which explains why you observed it working successfully. This behavior is expected and by design.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.