{"id":40561,"date":"2025-03-10T15:56:31","date_gmt":"2025-03-10T10:26:31","guid":{"rendered":"https:\/\/www.inogic.com\/blog\/?p=40561"},"modified":"2025-03-27T12:19:34","modified_gmt":"2025-03-27T06:49:34","slug":"regenerating-a-sas-key-for-an-http-triggered-flow-in-power-automate","status":"publish","type":"post","link":"https:\/\/www.inogic.com\/blog\/2025\/03\/regenerating-a-sas-key-for-an-http-triggered-flow-in-power-automate\/","title":{"rendered":"Regenerating a SAS Key for an HTTP-Triggered Flow in Power Automate"},"content":{"rendered":"<p>As mentioned in our <a href=\"https:\/\/www.inogic.com\/blog\/2025\/03\/how-to-secure-http-requests-using-oauth-authentication-in-power-automate\/\" target=\"_blank\" rel=\"noopener\">previous blog<\/a>, we discussed securing workflows by adding OAuth authentication to ensure that only authorized users within the tenant or specific individuals can execute the flow.<\/p>\n<p>However, when dealing with HTTP-triggered flows with anonymous access, keeping your Power Automate workflows secure is essential. Secure Access Signature (SAS) keys help protect these flows by controlling access to their HTTP endpoints, ensuring that only authorized requests can execute a flow.<\/p>\n<p>Whenever a new flow is created with the trigger \u201cWhen an HTTP request is received\u201d, and the \u201cWho can trigger the flow?\u201d option is set to \u201cAnyone\u201d, <a href=\"https:\/\/www.inogic.com\/services\/microsoft-power-platform\/microsoft-power-automate\/?utm_source=inogic-t-blog&amp;utm_medium=power-automate&amp;utm_campaign=itblog&amp;utm_id=power-automate\" target=\"_blank\" rel=\"noopener\">Power Automate<\/a> automatically generates an HTTP POST URL containing a SAS key. This key is embedded within the URL, as shown below.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40563\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/1HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"611\" height=\"441\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/1HTTP-Triggered-Flow-in-Power-Automate.jpg 611w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/1HTTP-Triggered-Flow-in-Power-Automate-300x217.jpg 300w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/><\/p>\n<p>While this mechanism provides security, SAS keys may need to be regenerated over time due to various reasons, such as key compromise, compliance with security policies, or periodic key rotation to mitigate potential risks.<\/p>\n<p>In this blog, we will walk through the steps to regenerate a SAS key for an HTTP-triggered flow.<\/p>\n<p><strong>Steps to Regenerate the SAS Key<\/strong><\/p>\n<p>1. Sign in to<a href=\"https:\/\/make.powerautomate.com\/\" target=\"_blank\" rel=\"noopener\">Power Automate Portal<\/a> and navigate to your flows.<\/p>\n<p>2. Find the flow that contains the HTTP Trigger Flows and click on Edit.<\/p>\n<p>3. Select the When a HTTP request is received step and note down the existing HTTP POST URL that includes the current SAS key.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40564\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/2HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"617\" height=\"445\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/2HTTP-Triggered-Flow-in-Power-Automate.jpg 617w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/2HTTP-Triggered-Flow-in-Power-Automate-300x216.jpg 300w\" sizes=\"(max-width: 617px) 100vw, 617px\" \/><\/p>\n<p>4. Navigate back to the Details page and open your browser\u2019s developer tools (F12).<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40565\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"1035\" height=\"495\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate.jpg 1035w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate-300x143.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate-1024x490.jpg 1024w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate-768x367.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/3HTTP-Triggered-Flow-in-Power-Automate-660x316.jpg 660w\" sizes=\"(max-width: 1035px) 100vw, 1035px\" \/><\/p>\n<p>5. Go to the Network tab and Filter requests by typing &#8220;runs?api-version&#8221;.If you are unable to find the request refresh the Detail page.<\/p>\n<p>6. Click on runs?api-version.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40566\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/4HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"1019\" height=\"221\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/4HTTP-Triggered-Flow-in-Power-Automate.jpg 1019w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/4HTTP-Triggered-Flow-in-Power-Automate-300x65.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/4HTTP-Triggered-Flow-in-Power-Automate-768x167.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/4HTTP-Triggered-Flow-in-Power-Automate-660x143.jpg 660w\" sizes=\"(max-width: 1019px) 100vw, 1019px\" \/><\/p>\n<p>7. Under the Header section, copy the Request URL and replace &#8220;runs&#8221; with &#8220;regenerateAccessKey&#8221; within the URL.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40567\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"1069\" height=\"90\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate.jpg 1069w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate-300x25.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate-1024x86.jpg 1024w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate-768x65.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/5HTTP-Triggered-Flow-in-Power-Automate-660x56.jpg 660w\" sizes=\"(max-width: 1069px) 100vw, 1069px\" \/><\/p>\n<p>8. Scroll down to the Request Header section and note down Authorization Access Token, as shown in the screenshot below.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40568\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/6HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"599\" height=\"76\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/6HTTP-Triggered-Flow-in-Power-Automate.jpg 599w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/6HTTP-Triggered-Flow-in-Power-Automate-300x38.jpg 300w\" sizes=\"(max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>9. Open Postman and create a new POST request using the modified Request URL.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40569\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/7HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"929\" height=\"257\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/7HTTP-Triggered-Flow-in-Power-Automate.jpg 929w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/7HTTP-Triggered-Flow-in-Power-Automate-300x83.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/7HTTP-Triggered-Flow-in-Power-Automate-768x212.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/7HTTP-Triggered-Flow-in-Power-Automate-660x183.jpg 660w\" sizes=\"(max-width: 929px) 100vw, 929px\" \/><\/p>\n<p>10. Under the Authorization tab, select Bearer Token as the authentication type and paste the Access Token into the token field.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40570\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/8HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"929\" height=\"277\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/8HTTP-Triggered-Flow-in-Power-Automate.jpg 929w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/8HTTP-Triggered-Flow-in-Power-Automate-300x89.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/8HTTP-Triggered-Flow-in-Power-Automate-768x229.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/8HTTP-Triggered-Flow-in-Power-Automate-660x197.jpg 660w\" sizes=\"(max-width: 929px) 100vw, 929px\" \/><\/p>\n<p>11. Click Send. If successful, you will receive a 200 OK response, confirming that the SAS key has been regenerated.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40571\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/9HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"939\" height=\"129\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/9HTTP-Triggered-Flow-in-Power-Automate.jpg 939w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/9HTTP-Triggered-Flow-in-Power-Automate-300x41.jpg 300w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/9HTTP-Triggered-Flow-in-Power-Automate-768x106.jpg 768w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/9HTTP-Triggered-Flow-in-Power-Automate-660x91.jpg 660w\" sizes=\"(max-width: 939px) 100vw, 939px\" \/><\/p>\n<p>12. To verify the new SAS key, return to Power Automate and edit the flow. Compare the new HTTP POST URL with the previous one to confirm that the key has changed.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-40572\" style=\"border: 1px solid #000000; padding: 1px; margin: 1px;\" src=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/10HTTP-Triggered-Flow-in-Power-Automate.jpg\" alt=\"HTTP-Triggered Flow in Power Automate\" width=\"613\" height=\"439\" srcset=\"https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/10HTTP-Triggered-Flow-in-Power-Automate.jpg 613w, https:\/\/www.inogic.com\/blog\/wp-content\/uploads\/2025\/03\/10HTTP-Triggered-Flow-in-Power-Automate-300x215.jpg 300w\" sizes=\"(max-width: 613px) 100vw, 613px\" \/><\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Regenerating SAS keys for HTTP-triggered flows is a vital security measure that helps protect your Power Automate workflows from unauthorized access. By following these steps, you can efficiently update the SAS keys in your Power Automate flow while ensuring continued security and functionality.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As mentioned in our previous blog, we discussed securing workflows by adding OAuth authentication to ensure that only authorized users within the tenant or specific individuals can execute the flow. However, when dealing with HTTP-triggered flows with anonymous access, keeping your Power Automate workflows secure is essential. Secure Access Signature (SAS) keys help protect these\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.inogic.com\/blog\/2025\/03\/regenerating-a-sas-key-for-an-http-triggered-flow-in-power-automate\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1985,2361],"tags":[3126],"class_list":["post-40561","post","type-post","status-publish","format-standard","hentry","category-power-automate","category-technical","tag-http-triggered-flow-in-power-automate"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/posts\/40561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/comments?post=40561"}],"version-history":[{"count":0,"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/posts\/40561\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/media?parent=40561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/categories?post=40561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inogic.com\/blog\/wp-json\/wp\/v2\/tags?post=40561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}