Managed connectors outbound IP addresses
Suppose you have an environment with strict network requirements or firewalls that limit traffic to specific IP addresses. If you use managed connectors or custom connectors in Azure Logic Apps or Microsoft Power Platform, your environment or firewall must allow access for the outbound IP addresses used by these connectors in your datacenter region. Otherwise, requests sent by these connectors won't work.
When you configure firewall access rules, make sure to pay attention to the port numbers. Most connectors work on top of HTTPS protocol and use HTTPS port 443 as the default. However, some connectors might use other port numbers and protocols, such as HTTP, FTP, or SMTP. Review the following recommendations to configure firewall inbound rules as described:
- For the destination (local) port, allow the appropriate port for the network protocol.
- For the source (remote) port, allow ANY/ALL.
The preferred way to obtain the most current up-to-date lists of outbound IP addresses and service tags is to programmatically utilize the Service Tag Discovery API. Alternatively, downloadable lists are available for Azure Public, Azure US Government, Microsoft Azure operated by 21Vianet, and Azure Germany clouds.
Note
Azure Logic Apps and Microsoft Power Platform each have their own datacenter regions.
Important
If firewall or other network restrictions are in place for your environment, network security groups must allow the appropriate region service tags or the appropriate IP ranges must be added to your allow lists.
Azure Logic Apps
Before you start configuring firewall access rules for Azure Logic Apps, review the following considerations:
Azure Logic Apps also has inbound and outbound IP addresses that require access. For more information, review Azure Logic Apps - Firewall IP configuration considerations.
For Azure China 21Vianet, fixed or reserved IP addresses are unavailable for managed connectors and custom connectors in China North and China East regions. However, they are available in China North 2 and China East 2 regions.
If you have Standard workflows that run in the single-tenant Azure Logic Apps environment, you need the fully qualified domain names (FQDNs) for your connections. For more information, review the corresponding sections in the following articles:
If you create and use security rules, you can reduce complexity by using service tags instead. That way, you don't have to explicitly specify the IP address prefixes for each region. Service tags work across the regions where Azure Logic Apps is available.
For more information about service tags, see Virtual network service tags.
The
AzureConnectors
tag represents the IP address prefixes used by managed connectors to make outbound calls to their respective services. The same service tag also represents IP address prefixes used by some managed connectors to make inbound webhook callbacks to Azure Logic Apps. Each region also has their ownAzureConnectors.[region]
service tag. You can use the same service tag to include all the IP address prefixes used by managed connectors.For example, the following managed connectors make inbound webhook callbacks to Azure Logic Apps: Adobe Creative Cloud, Adobe Sign, Adobe Sign Demo, Adobe Sign Preview, Adobe Sign Stage, Azure Sentinel, Business Central, Calendly, Common Data Service, DocuSign, DocuSign Demo, Dynamics 365 for Fin & Ops, LiveChat, Office 365 Outlook, Outlook.com, Parserr, SAP*, Shifts for Microsoft Teams, Teamwork Projects, and Typeform.
Important
In addition to the IP addresses listed in the Service Tag Discovery API (or downloadable lists) associated with the below Azure Logic Apps service tags, the below IP addresses must be explicitly allowlisted as well. IP addresses from both data sources are required to be allowlisted.
Region | Service tags | Outbound IP addresses |
---|---|---|
Australia East | AzureConnectors.AustraliaEast | |
Australia Southeast | AzureConnectors.AustraliaSoutheast | |
Brazil South | AzureConnectors.BrazilSouth | |
Brazil Southeast | AzureConnectors.BrazilSoutheast | 23.97.121.26 |
Canada Central | AzureConnectors.CanadaCentral | |
Canada East | AzureConnectors.CanadaEast | |
Central India | AzureConnectors.CentralIndia | |
Central US | AzureConnectors.CentralUS | 40.77.68.110 |
Central US EUAP | AzureConnectors.CentralUSEUAP | 20.288.37.79 |
China East 2 | AzureConnectors.ChinaEast2 | |
China East 3 | AzureConnectors.ChinaEast3 | |
China North 2 | AzureConnectors.ChinaNorth2 | |
China North 3 | AzureConnectors.ChinaNorth3 | |
East Asia | AzureConnectors.EastAsia | |
East US | AzureConnectors.EastUS | 52.188.157.160 |
East US 2 | AzureConnectors.EastUS2 | 40.65.220.25 |
East US 2 EUAP | AzureConnectors.EastUS2EUAP | |
France Central | AzureConnectors.FranceCentral | |
France South | AzureConnectors.FranceSouth | |
Germany North | AzureConnectors.GermanyNorth | |
Germany West Central | AzureConnectors.GermanyWestCentral | |
Israel Central | AzureConnectors.IsraelCentral | |
Italy North | AzureConnectors.ItalyNorth | |
Japan East | AzureConnectors.JapanEast | |
Japan West | AzureConnectors.JapanWest | 104.46.26.17 |
Jio India West | AzureConnectors.JioIndiaWest | 40.64.21.254 |
Korea Central | AzureConnectors.KoreaCentral | |
Korea South | AzureConnectors.KoreaSouth | |
North Central US | AzureConnectors.NorthCentralUS | |
North Europe | AzureConnectors.NorthEurope | 40.115.108.29 |
Norway East | AzureConnectors.NorwayEast | 51.120.92.27 |
Norway West | AzureConnectors.NorwayWest | 51.13.145.17 |
Poland Central | AzureConnectors.PolandCentral | |
Qatar Central | AzureConnectors.QatarCentral | |
South Africa North | AzureConnectors.SouthAfricaNorth | 40.127.2.94 |
South Africa West | AzureConnectors.SouthAfricaWest | 102.133.75.194 |
South Central US | AzureConnectors.SouthCentralUS | |
South India | AzureConnectors.SouthIndia | |
Southeast Asia | AzureConnectors.SoutheastAsia | |
Spain Central | AzureConnectors.SpainCentral | |
Sweden Central | AzureConnectors.SwedenCentral | |
Switzerland North | AzureConnectors.SwitzerlandNorth | |
Switzerland West | AzureConnectors.SwitzerlandWest | 51.107.231.190 |
UAE Central | AzureConnectors.UAECentral | 20.45.67.28 |
UAE North | AzureConnectors.UAENorth | 40.123.224.120 |
UK South | AzureConnectors.UKSouth | |
UK West | AzureConnectors.UKWest | |
West Central US | AzureConnectors.WestCentralUS | |
West Europe | AzureConnectors.WestEurope | 13.93.36.78 |
West India | AzureConnectors.WestIndia | |
West US | AzureConnectors.WestUS | |
West US 2 | AzureConnectors.WestUS2 | 13.66.164.219 |
West US 3 | AzureConnectors.WestUS3 | 20.38.173.7 |
US DoD Central | AzureConnectors.USDoDCentral | 52.182.54.8 |
US DoD East | AzureConnectors.USDoDEast | |
US Gov Arizona | AzureConnectors.USGovArizona | 52.244.69.0 |
US Gov Texas | AzureConnectors.USGovTexas | |
US Gov Virginia | AzureConnectors.USGovVirginia |
Power Platform
Requests from Power Platform use IP addresses or service tags that depend on the region and the environment in which the app or flow is located. To facilitate Power Platform requests, add the designated IP addresses or service tags in your allow list. For more information about service tags, see Virtual network service tags.
Important
In addition to the IP addresses listed in the Service Tag Discovery API (or downloadable lists) associated with the below Power Platform service tags, the below IP addresses must be explicitly allowlisted as well. IP addresses from both data sources are required to be allowlisted.
Multi-tenant region | Service tags | Outbound IP addresses |
---|---|---|
Asia | AzureConnectors.EastAsia AzureConnectors.SoutheastAsia |
52.151.217.109, 52.151.217.66 |
Australia | AzureConnectors.AustraliaCentral AzureConnectors.AustraliaCentral2 AzureConnectors.AustraliaEast AzureConnectors.AustraliaSoutheast |
|
Brazil | AzureConnectors.BrazilEast AzureConnectors.BrazilSoutheast AzureConnectors.BrazilSouth |
23.97.121.26 |
Canada | AzureConnectors.CanadaCentral AzureConnectors.CanadaEast |
|
China | AzureConnectors.ChinaEast2 AzureConnectors.ChinaEast3 AzureConnectors.ChinaNorth2 AzureConnectors.ChinaNorth3 |
|
Europe | AzureConnectors.NorthEurope AzureConnectors.WestEurope |
40.115.108.29, 13.93.36.78 |
France | AzureConnectors.FranceCentral AzureConnectors.FranceSouth |
|
Germany | AzureConnectors.GermanyCentral AzureConnectors.GermanyNorthEast AzureConnectors.GermanyNorth AzureConnectors.GermanyWestCentral |
|
India | AzureConnectors.CentralIndia AzureConnectors.JioIndiaCentral AzureConnectors.JioIndiaWest AzureConnectors.SouthIndia AzureConnectors.WestIndia |
104.211.214.161 |
Japan | AzureConnectors.JapanEast AzureConnectors.JapanWest |
|
Korea | AzureConnectors.KoreaCentral AzureConnectors.KoreaSouth |
52.231.160.99 |
Norway | AzureConnectors.NorwayEast AzureConnectors.NorwayWest |
51.120.92.27 |
Singapore | AzureConnectors.SoutheastAsia | 52.151.217.109, 52.151.217.66 |
South Africa | AzureConnectors.SouthAfricaNorth AzureConnectors.SouthAfricaWest |
40.127.2.94, 102.133.75.194 |
Sweden | AzureConnectors.SwedenCentral | |
Switzerland | AzureConnectors.SwitzerlandNorth AzureConnectors.SwitzerlandWest |
51.107.231.190 |
United Arab Emirates | AzureConnectors.UAECentral AzureConnectors.UAENorth |
20.45.67.28, 40.123.224.120 |
United Kingdom | AzureConnectors.UKNorth AzureConnectors.UKSouth AzureConnectors.UKSouth2 AzureConnectors.UKWest |
|
United States (Preview) | AzureConnectors.WestCentralUS AzureConnectors.WestUS2 |
13.66.164.219 |
United States | AzureConnectors.NorthCentralUS AzureConnectors.SouthCentralUS AzureConnectors.CentralUS AzureConnectors.EastUS AzureConnectors.EastUS2 AzureConnectors.WestUS AzureConnectors.WestUS2 AzureConnectors.WestUS3 |
52.188.157.160, 40.77.68.110, 40.65.220.25, 52.181.180.194, 52.181.182.180, 52.151.217.109, 52.151.217.66 |
United States Government (GCC) | AzureConnectors.USGovArizona AzureConnectors.USGovIowa AzureConnectors.USGovTexas AzureConnectors.USGovVirginia |
52.245.161.213, 52.126.190.111, 20.141.95.45, 20.141.94.250 |
United States Government (GCC High) | AzureConnectors.USGovArizona AzureConnectors.USGovTexas AzureConnectors.USGovVirginia |
20.141.100.65, 52.126.191.63, 20.141.142.113, 20.141.142.106 |
Department of Defense (DoD) in Azure Government | AzureConnectors.USDoDCentral AzureConnectors.USDoDEast |