
Dynamics 365 Business Central 2026 Wave 1 release (version 28) is available starting from April 1, 2026 (and it’s true despite the April Fool’s Day).
This new major version of the product brings with it several new features in every area (yesterday I’ve done a webcast with more than 400 people describing quite all the upcoming news), but there are also some small hidden new features that are worth pointing out.
One of the important changes coming with this wave is a change on how Business Central makes URI validation with AL HttpClient.
Microsoft has announced an important security enhancement in Business Central v28 that affects how developers handle outgoing HTTP requests. This change introduces stricter validation of URIs (web addresses) in the AL HttpClient, with the goal of preventing Server-Side Request Forgery (SSRF) attacks and protecting internal network infrastructure. While this is a positive security move, it’s essential for developers and administrators to understand the implications and how to handle it in their environments.
Starting with Business Central v28, outgoing HTTP calls made through the AL HttpClient are subject to hardened URI validation. This means that the system will now actively block HTTP requests to non-routable (internal) network addresses by default. Non-routable addresses include for example the following:
This change addresses a significant security vulnerability known as Server-Side Request Forgery (SSRF). In an SSRF attack, an attacker tricks a server-side application into making HTTP requests to internal systems that should not be accessible from the outside world.
Imagine a malicious actor crafts a request that tricks your Business Central extension into making an HTTP call to an internal database server or administrative service running on the company’s private network. Without this protection, the attacker could potentially access sensitive data or compromise internal systems.
By blocking internal network requests by default, Microsoft is ensuring that extensions (whether developed in-house or sourced from AppSource) cannot be exploited to attack your internal infrastructure.
The security enhancement applies differently depending on whether you’re running Business Central in the cloud or on-premises.
For organizations using Business Central online, there is no way to bypass this security restriction. This is intentional and non-negotiable:
What this means for you: if your extension needs to communicate with an external API or service, it must be accessible from the public internet. Internal integrations that worked with older versions of the product may need to be refactored to use different integration features (like Logic Apps for example) or moved to public-facing endpoints.
Organizations running Business Central on their own servers have more flexibility, though the default behavior is still restrictive:
Two new configuration settings are available for Business Central on-premise:
false to disable the protection entirely (not recommended for security-conscious organizations).https://internal-api.company.local/Important note: Even though on-premises environments offer this flexibility, Microsoft recommends keeping the protection enabled and only whitelisting specific, trusted addresses when absolutely necessary.
This security enhancement has been backported to Business Central versions 26.x and 27.x, meaning the protection applies even if you’re not immediately upgrading to v28. This ensures consistent security across supported versions and prevents attackers from exploiting vulnerabilities in older deployments.
If you’re upgrading to v28 and have extensions that make HTTP calls, here’s what to do:
Step 1: Audit Your Extensions
Step 2: Determine Your Environment Type
Step 3: Refactor or Configure
For cloud/SaaS environments:
For on-premises environments:
NavHttpClientAntiSSRFAllowedAddresses to whitelist necessary internal addresses.Step 4: Test thoroughly
The hardened URI validation in Business Central 2026 Wave 1 release (v28) represents a significant step forward in security. While it may require some adjustments to existing integrations, the protection it provides against SSRF attacks is well worth the effort. Organizations using cloud-hosted Business Central should plan their integrations around the restriction, while on-premises customers should use the configuration options judiciously and maintain a security-first mindset.
By understanding this change and planning accordingly, you can ensure your Business Central environment remains both secure and functional for your business needs.
Original Post https://demiliani.com/2026/04/02/dynamics-365-business-central-new-strict-uri-validation-in-al-http-client/






