Edit

Share via


IP address configuration for Power Automate

This article describes the required configuration for:

  • Power Automate to connect to services in your network by inbound firewall configuration, and
  • Your makers and users to access Power Automate to build and use experiences by outbound firewall configuration.

For configuration details in this article, use the links in the following table.

For details in this category Select from these links
Allow flows to call your services
  • Allow connector calls to your services
  • Allowlist 'HTTP' and 'HTTP + Swagger' calls to your services
  • Allow users on your network to use Power Automate
  • Use the Power Automate web portal
  • Allow users on your network to use Power Automate mobile app
  • Allow users on your network to use "When an HTTP request is received" trigger
  • Allow machines & users on your network to access Power Automate desktop services
  • Global endpoints for desktop flows runtime
  • Global endpoints for Power Automate for desktop MSI installer
  • Public endpoints for desktop flows runtime
  • US Government endpoints for desktop flows runtime
  • 21Vianet endpoints (China) for desktop flows runtime
  • Other IP address articles and FAQ
  • Approval email delivery
  • Azure SQL database
  • There are lots of details here—what's the high level recommendation for IP address configuration?
  • If I'm using Azure firewall, do I need to keep track of individual IP addresses?
  • If I'm using on-premises firewall, do I need to keep track of individual IP addresses?
  • Allow flows to call your services

    The following two sections list the network configuration required for Power Automate to connect to services in your network. This configuration is needed only if you're restricting inbound or outbound IP addresses on your network (for example, through a firewall).

    Allow connector calls to your services

    Power Automate flows are comprised of actions. Actions can utilize both connector actions and native actions such as 'HTTP' and 'HTTP + Swagger'. To enable connector actions to call services hosted in your network, allow traffic into your network from the AzureConnectors service tag.

    Allowlist 'HTTP' and 'HTTP + Swagger' calls to your services

    For flows consisting of actions including 'HTTP' and 'HTTP + Swagger' actions, allow traffic from all the following service tags:

    Service tag Required?
    LogicApps yes
    PowerPlatformPlex yes

    screenshot of HTTP actions.

    Allow users on your network to use Power Automate

    This section contains information on providing your makers and users access to the build and use experiences within Power Automate.

    Use the Power Automate web portal

    The Power Automate web portal is also known as the maker portal.

    The following table lists the services to which Power Automate connects. Ensure none of these services is blocked on your network.

    Domains Protocols Uses
    login.microsoft.com
    login.windows.net
    login.microsoftonline.com
    login.live.com
    secure.aadcdn.microsoftonline-p.com
    https Access to authentication and authorization endpoints.
    graph.microsoft.com https Access to Microsoft Graph for getting user information such as a profile photo.
    *.azure-apim.net https Access to the Runtime for connectors.
    *.azure-apihub.net https Access to the Runtime for connectors.
    *.blob.core.windows.net https Location of exported flows.
    *.flow.microsoft.com
    *.logic.azure.com
    https Access to the Power Automate site.
    *.powerautomate.com https Access to Power Automate site.
    *.powerapps.com https Access to the Power Apps site.
    *.azureedge.net https Access to Power Automate CDN.
    *.azurefd.net https Access to Power Automate CDN.
    *.microsoftcloud.com https Access to NPS (Net Promoter Score).
    webshell.suite.office.com https Access to Office for header and search. Learn more in Office 365 URLs and ranges.
    *.dynamics.com https Access to Dataverse tables.
    go.microsoft.com https Access to the Power Automate to check for updates.
    download.microsoft.com https Access to the Power Automate to check for updates.
    login.partner.microsoftonline.cn https Access to the Power Automate for desktop cloud discovery.
    s2s.config.skype.com
    use.config.skype.com
    config.edge.skype.com
    https Access to preview features managed through flighting and configuration endpoints.
    s2s.config.ecs.infra.gov.teams.microsoft.us https Access to preview features managed through flighting and configuration endpoints for US government cloud.
    *.api.powerplatform.com
    *.api.powerplatformusercontent.com
    *.api.bap.microsoft.com
    *.logic.azure.com
    https Access to several Power Platform APIs.
    *.api.gov.powerplatform.microsoft.us
    *.gov.api.bap.microsoft.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - GCC only).
    *.api.high.powerplatform.microsoft.us
    *.high.api.bap.microsoft.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - GCC High only).
    *.api.appsplatform.us
    *.api.bap.appsplatform.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - DoD only).
    *.api.powerplatform.partner.microsoftonline.cn
    *.api.bap.partner.microsoftonline.cn
    *.logic.azure.cn
    https Access to several Power Platform APIs (21Vianet - China only).

    Allow users on your network to use Power Automate mobile app

    The following table lists additional endpoints you need when using Power Automate mobile app.

    Domains Protocols Uses
    *.events.data.microsoft.com https Send telemetry for all production regions and supported US sovereign clouds from the mobile app.
    collector.azure.cn https Send telemetry for the Mooncake region from the mobile app.
    officeapps.live.com https Access to authentication and authorization endpoints for the mobile app.

    Allow users on your network to use "When an HTTP request is received" trigger

    We recommend allowlisting the list of domains in the Use the Power Automate web portal section to ensure your makers and admins can take advantage of the Power Automate services. For customers looking to narrowly allow network traffic to support the When an HTTP request is received trigger, allowlist the following domains in your firewall's outbound configuration.

    Domains Protocols Uses
    *.api.powerplatform.com
    *.logic.azure.com
    https Access to several Power Platform APIs.
    *.api.gov.powerplatform.microsoft.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - GCC only).
    *.api.high.powerplatform.microsoft.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - GCC High only).
    *.api.appsplatform.us
    *.logic.azure.us
    https Access to several Power Platform APIs (U.S. Government - DoD only).
    *.api.powerplatform.partner.microsoftonline.cn
    *.logic.azure.cn
    https Access to several Power Platform APIs (21Vianet - China only).

    Allow machines & users on your network to access Power Automate desktop services

    The following table lists endpoint data requirements for connectivity from a user's machine for desktop flows runs. Ensure that you authorize global endpoints and the endpoints corresponding to your cloud.

    Global endpoints for desktop flows runtime

    Domains Protocols Uses
    server.events.data.microsoft.com https Handles telemetry for users outside EMEA, US government, and Chinese clouds. Works as the fallback telemetry endpoint.
    msedgedriver.azureedge.net
    chromedriver.storage.googleapis.com
    https Access to desktop flows WebDriver downloaders. WebDriver is used to automate your browser (Microsoft Edge and Google Chrome).

    Global endpoints for Power Automate for desktop MSI installer

    Domains Protocols Uses
    *.builds.dotnet.microsoft.com https Downloads the .NET 8 runtime if it isn't already installed on the machine.

    Public endpoints for desktop flows runtime

    Domains Protocols Uses
    ocsp.digicert.com
    ocsp.msocsp.com
    mscrl.microsoft.com
    crl3.digicert.com
    crl4.digicert.com
    http Access to the CRL server for the public cloud.
    Needed when connecting through the on-premises data gateway.
    *.servicebus.windows.net https Listens on Service Bus Relay over TCP.
    Needed for machine connectivity.
    *.gateway.prod.island.powerapps.com https Needed for machine connectivity.
    emea.events.data.microsoft.com https Handles telemetry for EMEA users.
    *.api.powerplatform.com https Access to several Power Platform APIs (mandatory for cloud connectors utilization in desktop flows).
    *.dynamics.com https Access to Dataverse tables (mandatory for custom actions in desktop flows)(also valid for GCC).

    Note

    If you don’t want to allow the public endpoint *.servicebus.windows.net, you can allow the list of namespaces individually. Learn more about namespace endpoints in Allowlist of namespaces endpoints required for desktop flows runtime.

    US Government endpoints for desktop flows runtime

    Domains Protocols Uses
    ocsp.digicert.com
    crl3.digicert.com
    crl4.digicert.com
    http Access to the CRL server for US government cloud.
    Needed when connecting through the on-premises data gateway.
    *.servicebus.usgovcloudapi.net https Listens on Service Bus Relay for US government cloud.
    Needed for machine connectivity.
    *.gateway.gov.island.powerapps.us https Needed for machine connectivity for US government cloud (GCC and GCCH).
    *.gateway.gov.island.appsplatform.us https Needed for machine connectivity for US government cloud (DOD).
    tb.events.data.microsoft.com https Handles telemetry for US government users.
    *.api.gov.powerplatform.microsoft.us https Access to several Power Platform APIs (mandatory for cloud connector action in desktop flows) (US Government - GCC only).
    *.api.high.powerplatform.microsoft.us https Access to several Power Platform APIs (mandatory for cloud connector actions in desktop flows) (US Government - GCC High only).
    *.api.appsplatform.us https Access to several Power Platform APIs (mandatory for cloud connector actions in desktop flows) (US Government - DoD only).
    *.microsoftdynamics.us https Access to Dataverse tables (mandatory for custom actions in desktop flows)(US Government - GCC High only).
    *.crm.appsplatform.us https Access to Dataverse tables (mandatory for custom actions in desktop flows)(US Government - DoD only).
    *.dynamics.com https Access to Dataverse tables (mandatory for custom actions in desktop flows)(also valid for public clouds).

    21Vianet endpoints (China) for desktop flows runtime

    Domains Protocols Uses
    crl.digicert.cn
    ocsp.digicert.cn
    http Access to the CRL servers for 21Vianet operated cloud.
    Needed when connecting through the on-premises data gateway.
    apac.events.data.microsoft.com https Handles telemetry for users in China.
    *.gateway.mooncake.island.powerapps.cn https Needed for machine connectivity (21Vianet - China only).
    *.api.powerplatform.partner.microsoftonline.cn https Access to several Power Platform APIs (mandatory for cloud connector actions in desktop flows) (21Vianet - China only).
    *.dynamics.cn https Access to Dataverse tables (DesktopFlow modules feature)(21Vianet - China only).
    *.api.powerautomate.cn https Access to Power Automate (21Vianet - China only).

    Other IP address articles

    Approval email delivery

    Learn more about approvals email routing in Power Automate approval email delivery information.

    Azure SQL database

    If you need to authorize IP addresses for your Azure SQL database, use the Power Platform outbound IP addresses.

    FAQ

    There are lots of details here—what's the high level recommendation for IP address configuration?

    The simplest mechanism to configure a firewall to allow Power Automate cloud flows to call external services through connectors is to use Azure service tags. The primary service tag for Logic Apps connectors is AzureConnectors, as described in Power Platform outbound IP addresses.

    If I'm using Azure firewall, do I need to keep track of individual IP addresses?

    You should use Azure service tags. By using service tags in your network security group rules, you don't need to constantly monitor and manually update IP ranges for each service.

    If I'm using on-premises firewall, do I need to keep track of individual IP addresses?

    You should use the Service Tags with an on-premises firewall so you don't need to monitor and manually update IP ranges. The Service Tag Discovery API provides access to the latest IP address ranges associated with each service tag, enabling you to stay current with changes.