Call service endpoints over HTTP or HTTPS from Azure Logic Apps
With Azure Logic Apps and the built-in HTTP trigger or action, you can create automated tasks and workflows that can send outbound requests to endpoints on other services and systems over HTTP or HTTPS. To receive and respond to inbound HTTPS calls instead, use the built-in Request trigger and Response action.
For example, you can monitor a service endpoint for your website by checking that endpoint on a specific schedule. When the specified event happens at that endpoint, such as your website going down, the event triggers your logic app's workflow and runs the actions in that workflow.
To check or poll an endpoint on a recurring schedule, add the HTTP trigger as the first step in your workflow. Each time that the trigger checks the endpoint, the trigger calls or sends a request to the endpoint. The endpoint's response determines whether your logic app's workflow runs. The trigger passes any content from the endpoint's response to the actions in your logic app.
To call an endpoint from anywhere else in your workflow, add the HTTP action. The endpoint's response determines how your workflow's remaining actions run.
This article shows how to use the HTTP trigger and HTTP action so that your logic app can send outbound calls to other services and systems.
For information about encryption, security, and authorization for outbound calls from your logic app, such as Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), self-signed certificates, or Azure Active Directory Open Authentication (Azure AD OAuth), see Secure access and data - Access for outbound calls to other services and systems.
Prerequisites
An Azure account and subscription. If you don't have an Azure subscription, sign up for a free Azure account.
The URL for the target endpoint that you want to call
Basic knowledge about how to create logic app workflows. If you're new to logic apps, see What is Azure Logic Apps?
The logic app from where you want to call the target endpoint. To start with the HTTP trigger, you'll need a blank logic app workflow. To use the HTTP action, start your logic app with any trigger that you want. This example uses the HTTP trigger as the first step.
Add an HTTP trigger
This built-in trigger makes an HTTP call to the specified URL for an endpoint and returns a response.
Sign in to the Azure portal. Open your blank logic app in Logic App Designer.
Under the designer's search box, select Built-in. In the search box, enter
http
as your filter. From the Triggers list, select the HTTP trigger.This example renames the trigger to "HTTP trigger" so that the step has a more descriptive name. Also, the example later adds an HTTP action, and both names must be unique.
Provide the values for the HTTP trigger parameters that you want to include in the call to the target endpoint. Set up the recurrence for how often you want the trigger to check the target endpoint.
If you select an authentication type other than None, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
To add other available parameters, open the Add new parameter list, and select the parameters that you want.
Continue building your logic app's workflow with actions that run when the trigger fires.
When you're done, remember to save your logic app. On the designer toolbar, select Save.
Add an HTTP action
This built-in action makes an HTTP call to the specified URL for an endpoint and returns a response.
Sign in to the Azure portal. Open your logic app in Logic App Designer.
This example uses the HTTP trigger as the first step.
Under the step where you want to add the HTTP action, select New step.
To add an action between steps, move your pointer over the arrow between steps. Select the plus sign (+) that appears, and then select Add an action.
Under Choose an action, select Built-in. In the search box, enter
http
as your filter. From the Actions list, select the HTTP action.This example renames the action to "HTTP action" so that the step has a more descriptive name.
Provide the values for the HTTP action parameters that you want to include in the call to the target endpoint.
If you select an authentication type other than None, the authentication settings differ based on your selection. For more information about authentication types available for HTTP, see these topics:
To add other available parameters, open the Add new parameter list, and select the parameters that you want.
When you're done, remember to save your logic app. On the designer toolbar, select Save.
Trigger and action outputs
Here's more information about the outputs from an HTTP trigger or action, which returns this information:
Property | Type | Description |
---|---|---|
headers |
JSON object | The headers from the request |
body |
JSON object | The object with the body content from the request |
status code |
Integer | The status code from the request |
Status code | Description |
---|---|
200 | OK |
202 | Accepted |
400 | Bad request |
401 | Unauthorized |
403 | Forbidden |
404 | Not Found |
500 | Internal server error. Unknown error occurred. |
Authentication for single-tenant environment
If you have a Logic App (Standard) resource in single-tenant Azure Logic Apps, and you want to use an HTTP operation with any of the following authentication types, make sure to complete the extra setup steps for the corresponding authentication type. Otherwise, the call fails.
TLS/SSL certificate: Add the app setting,
WEBSITE_LOAD_ROOT_CERTIFICATES
, and set the value to the thumbprint for your TLS/SSL certificate.Client certificate or Azure Active Directory Open Authentication (Azure AD OAuth) with the "Certificate" credential type: Add the app setting,
WEBSITE_LOAD_USER_PROFILE
, and set the value to1
.
TLS/SSL certificate authentication
In your logic app resource's app settings, add or update the app setting,
WEBSITE_LOAD_ROOT_CERTIFICATES
.For the setting value, provide the thumbprint for your TLS/SSL certificate as the root certificate to be trusted.
"WEBSITE_LOAD_ROOT_CERTIFICATES": "<thumbprint-for-TLS/SSL-certificate>"
For example, if you're working in Visual Studio Code, follow these steps:
Open your logic app project's local.settings.json file.
In the
Values
JSON object, add or update theWEBSITE_LOAD_ROOT_CERTIFICATES
setting:{ "IsEncrypted": false, "Values": { <...> "AzureWebJobsStorage": "UseDevelopmentStorage=true", "WEBSITE_LOAD_ROOT_CERTIFICATES": "<thumbprint-for-TLS/SSL-certificate>", <...> } }
Note
To find the thumbprint, follow these steps:
On your logic app resource menu, under Settings, select TLS/SSL settings > Private Key Certificates (.pfx) or Public Key Certificates (.cer).
Find the certificate that you want to use, and copy the thumbprint.
For more information, review Find the thumbprint - Azure App Service.
For more information, review the following documentation:
- Edit host and app settings for logic apps in single-tenant Azure Logic Apps
- Private client certificates - Azure App Service
Client certificate or Azure AD OAuth with "Certificate" credential type authentication
In your logic app resource's app settings, add or update the app setting,
WEBSITE_LOAD_USER_PROFILE
.For the setting value, specify
1
."WEBSITE_LOAD_USER_PROFILE": "1"
For example, if you're working in Visual Studio Code, follow these steps:
Open your logic app project's local.settings.json file.
In the
Values
JSON object, add or update theWEBSITE_LOAD_USER_PROFILE
setting:{ "IsEncrypted": false, "Values": { <...> "AzureWebJobsStorage": "UseDevelopmentStorage=true", "WEBSITE_LOAD_USER_PROFILE": "1", <...> } }
For more information, review the following documentation:
- Edit host and app settings for logic apps in single-tenant Azure Logic Apps
- Private client certificates - Azure App Service
Content with multipart/form-data type
To handle content that has multipart/form-data
type in HTTP requests, you can add a JSON object that includes the $content-type
and $multipart
attributes to the HTTP request's body by using this format.
"body": {
"$content-type": "multipart/form-data",
"$multipart": [
{
"body": "<output-from-trigger-or-previous-action>",
"headers": {
"Content-Disposition": "form-data; name=file; filename=<file-name>"
}
}
]
}
For example, suppose you have a logic app that sends an HTTP POST request for an Excel file to a website by using that site's API, which supports the multipart/form-data
type. Here's how this action might look:
Here's the same example that shows the HTTP action's JSON definition in the underlying workflow definition:
"HTTP_action": {
"inputs": {
"body": {
"$content-type": "multipart/form-data",
"$multipart": [
{
"body": "@trigger()",
"headers": {
"Content-Disposition": "form-data; name=file; filename=myExcelFile.xlsx"
}
}
]
},
"method": "POST",
"uri": "https://finance.contoso.com"
},
"runAfter": {},
"type": "Http"
}
Content with application/x-www-form-urlencoded type
To provide form-urlencoded data in the body for an HTTP request, you have to specify that the data has the application/x-www-form-urlencoded
content type. In the HTTP trigger or action, add the content-type
header. Set the header value to application/x-www-form-urlencoded
.
For example, suppose you have a logic app that sends an HTTP POST request to a website, which supports the application/x-www-form-urlencoded
type. Here's how this action might look:
Asynchronous request-response behavior
For stateful workflows in both multi-tenant and single-tenant Azure Logic Apps, all HTTP-based actions follow the standard asynchronous operation pattern as the default behavior. This pattern specifies that after an HTTP action calls or sends a request to an endpoint, service, system, or API, the receiver immediately returns a "202 ACCEPTED" response. This code confirms that the receiver accepted the request but hasn't finished processing. The response can include a location
header that specifies the URI and a refresh ID that the caller can use to poll or check the status for the asynchronous request until the receiver stops processing and returns a "200 OK" success response or other non-202 response. However, the caller doesn't have to wait for the request to finish processing and can continue to run the next action. For more information, see Asynchronous microservice integration enforces microservice autonomy.
For stateless workflows in single-tenant Azure Logic Apps, HTTP-based actions don't use the asynchronous operation pattern. Instead, they only run synchronously, return the "202 ACCEPTED" response as-is, and proceed to the next step in the workflow execution. If the response includes a location
header, a stateless workflow won't poll the specified URI to check the status. To follow the standard asynchronous operation pattern, use a stateful workflow instead.
In the Logic App Designer, the HTTP action, but not trigger, has an Asynchronous Pattern setting, which is enabled by default. This setting specifies that the caller doesn't wait for processing to finish and can move on to the next action but continues checking the status until processing stops. If disabled, this setting specifies that the caller waits for processing to finish before moving on to the next action.
To find this setting, follow these steps:
On the HTTP action's title bar, select the ellipses (...) button, which opens the action's settings.
Find the Asynchronous Pattern setting.
The HTTP action's underlying JavaScript Object Notation (JSON) definition implicitly follows the asynchronous operation pattern.
Disable asynchronous operations
Sometimes, you might want to disable the HTTP action's asynchronous behavior in specific scenarios, for example, when you want to:
Turn off Asynchronous Pattern setting
In the Logic App Designer, on the HTTP action's title bar, select the ellipses (...) button, which opens the action's settings.
Find the Asynchronous Pattern setting, turn the setting to Off if enabled, and select Done.
Disable asynchronous pattern in action's JSON definition
In the HTTP action's underlying JSON definition, add the "DisableAsyncPattern"
operation option to the action's definition so that the action follows the synchronous operation pattern instead. For more information, see also Run actions in a synchronous operation pattern.
Avoid HTTP timeouts for long-running tasks
HTTP requests have a timeout limit. If you have a long-running HTTP action that times out due to this limit, you have these options:
Disable the HTTP action's asynchronous operation pattern so that the action doesn't continually poll or check the request's status. Instead, the action waits for the receiver to respond with the status and results after the request finishes processing.
Replace the HTTP action with the HTTP Webhook action, which waits for the receiver to respond with the status and results after the request finishes processing.
Set up interval between retry attempts with the Retry-After header
To specify the number of seconds between retry attempts, you can add the Retry-After
header to the HTTP action response. For example, if the target endpoint returns the 429 - Too many requests
status code, you can specify a longer interval between retries. The Retry-After
header also works with the 202 - Accepted
status code.
Here's the same example that shows the HTTP action response that contains Retry-After
:
{
"statusCode": 429,
"headers": {
"Retry-After": "300"
}
}
Pagination support
Sometimes, the target service responds by returning the results one page at a time. If the response specifies the next page with the nextLink or @odata.nextLink property, you can turn on the Pagination setting on the HTTP action. This setting causes the HTTP action to automatically follow these links and get the next page. However, if the response specifies the next page with any other tag, you might have to add a loop to your workflow. Make this loop follow that tag and manually get each page until the tag is null.
Disable checking location headers
Some endpoints, services, systems, or APIs return a 202 ACCEPTED
response that doesn't have a location
header. To avoid having an HTTP action continually check the request status when the location
header doesn't exist, you can have these options:
Disable the HTTP action's asynchronous operation pattern so that the action doesn't continually poll or check the request's status. Instead, the action waits for the receiver to respond with the status and results after the request finishes processing.
Replace the HTTP action with the HTTP Webhook action, which waits for the receiver to respond with the status and results after the request finishes processing.
Known issues
Omitted HTTP headers
If an HTTP trigger or action includes these headers, Logic Apps removes these headers from the generated request message without showing any warning or error:
Accept-*
headers except forAccept-version
Allow
Content-*
headers except forContent-Disposition
,Content-Encoding
, andContent-Type
, which are honored when you use the POST and PUT operations. However, Logic Apps drops these headers when you use the GET operation.Cookie
header, but Logic Apps honors any value that you specify using the Cookie property.Expires
Host
Last-Modified
Origin
Set-Cookie
Transfer-Encoding
Although Logic Apps won't stop you from saving logic apps that use an HTTP trigger or action with these headers, Logic Apps ignores these headers.
Connector reference
For technical information about trigger and action parameters, see these sections:
Next steps
Feedback
Submit and view feedback for