Learn About Security Policies for Trigger Connections
The adapter definition document supports a number of managed inbound security policies for trigger connection definitions. These security policies protect your endpoints by validating incoming requests from external applications.
Managed Security Policies for Trigger Connections: