This article describes the required configuration for:
Power Automate to connect to services in your network by inbound firewall configuration, and
Your makers and users to access Power Automate to build and use experiences by outbound firewall configuration.
High-level recommendation for IP address configuration
The simplest mechanism to configure a firewall to allow Power Automate cloud flows to call external services through connectors is to use Azure service tags. The primary service tag for Logic Apps connectors is AzureConnectors, as described in Power Platform outbound IP addresses.
Monitor IP ranges
Depending on the firewall you're using, you don't need to monitor and manually update IP ranges, The following table describes the recommended tracking method for each firewall type.
Firewall
Tracking method
Azure
Use Azure service tags. By using service tags in your network security group rules, you don't need to constantly monitor and manually update IP ranges for each service.
On-premises
Use the Service Tags with an on-premises firewall so you don't need to monitor and manually update IP ranges. The Service Tag Discovery API provides access to the latest IP address ranges associated with each service tag, enabling you to stay current with changes.
Configuration details
For configuration details, use the links in the following table.
The following two sections list the network configuration required for Power Automate to connect to services in your network. This configuration is needed only if you're restricting inbound or outbound IP addresses on your network (for example, through a firewall).
Allow connector calls to your services
Power Automate flows are comprised of actions. Actions can utilize both connector actions and native actions such as 'HTTP' and 'HTTP + Swagger'. To enable connector actions to call services hosted in your network, allow traffic into your network from the AzureConnectors service tag.
Allowlist 'HTTP' and 'HTTP + Swagger' calls to your services
For flows consisting of actions including 'HTTP' and 'HTTP + Swagger' actions, allow traffic from all the following service tags:
Service tag
Required?
LogicApps
yes
PowerPlatformPlex
yes
Allow users on your network to use Power Automate
This section contains information on providing your makers and users access to the build and use experiences within Power Automate.
Use the Power Automate web portal
The Power Automate web portal is also known as the maker portal.
The following table lists the services to which Power Automate connects. Ensure none of these services is blocked on your network.
Access to several Power Platform APIs (21Vianet - China only).
Allow users on your network to use Power Automate mobile app
The following table lists additional endpoints you need when using Power Automate mobile app.
Domains
Protocols
Uses
*.events.data.microsoft.com
https
Send telemetry for all production regions and supported US sovereign clouds from the mobile app.
collector.azure.cn
https
Send telemetry for the Mooncake region from the mobile app.
officeapps.live.com
https
Access to authentication and authorization endpoints for the mobile app.
Allow users on your network to use "When an HTTP request is received" trigger
We recommend allowlisting the list of domains in the Use the Power Automate web portal section to ensure your makers and admins can take advantage of the Power Automate services. For customers looking to narrowly allow network traffic to support the When an HTTP request is received trigger, allowlist the following domains in your firewall's outbound configuration.
Access to several Power Platform APIs (21Vianet - China only).
Allow machines & users on your network to access Power Automate desktop services
The following table lists endpoint data requirements for connectivity from a user's machine for desktop flows runs. Ensure that you authorize global endpoints and the endpoints corresponding to your cloud.
Global endpoints for desktop flows runtime
Domains
Protocols
Uses
server.events.data.microsoft.com
https
Handles telemetry for users outside EMEA, US government, and Chinese clouds. Works as the fallback telemetry endpoint.