Skip to content

Commit 2df6d79

Browse files
committed
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents df72772 + f47eed5 commit 2df6d79

File tree

43 files changed

+985
-335
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+985
-335
lines changed
11.6 KB
Loading
1.48 KB
Loading

articles/active-directory/external-identities/self-service-sign-up-user-flow.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: active-directory
55
ms.service: active-directory
66
ms.subservice: B2B
77
ms.topic: how-to
8-
ms.date: 04/26/2022
8+
ms.date: 10/12/2022
99

1010
ms.author: mimart
1111
author: msmimart
@@ -61,9 +61,10 @@ Next, you'll create the user flow for self-service sign-up and add it to an appl
6161

6262
![Add a new user flow button](media/self-service-sign-up-user-flow/new-user-flow.png)
6363

64-
5. On the **Create** page, enter a **Name** for the user flow. Note that the name is automatically prefixed with **B2X_1_**.
65-
6. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
66-
7. Under **User attributes**, choose the attributes you want to collect from the user. For additional attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
64+
5. Select the user flow type (for example, **Sign up and sign in**), and then select the version (**Recommended** or **Preview**).
65+
6. On the **Create** page, enter a **Name** for the user flow. Note that the name is automatically prefixed with **B2X_1_**.
66+
7. In the **Identity providers** list, select one or more identity providers that your external users can use to log into your application. **Azure Active Directory Sign up** is selected by default. (See [Before you begin](#before-you-begin) earlier in this article to learn how to add identity providers.)
67+
8. Under **User attributes**, choose the attributes you want to collect from the user. For additional attributes, select **Show more**. For example, select **Show more**, and then choose attributes and claims for **Country/Region**, **Display Name**, and **Postal Code**. Select **OK**.
6768

6869
![Create a new user flow page](media/self-service-sign-up-user-flow/create-user-flow.png)
6970

@@ -86,7 +87,7 @@ You can choose order in which the attributes are displayed on the sign-up page.
8687

8788
## Add applications to the self-service sign-up user flow
8889

89-
Now you can associate applications with the user flow.
90+
Now you'll associate applications with the user flow to enable sign-up for those applications. New users who access the associated applications will be presented with your new self-service sign-up experience.
9091

9192
1. Sign in to the [Azure portal](https://portal.azure.com) as an Azure AD administrator.
9293
2. Under **Azure services**, select **Azure Active Directory**.
@@ -107,3 +108,4 @@ Now you can associate applications with the user flow.
107108
- [Add Facebook to your list of social identity providers](facebook-federation.md)
108109
- [Use API connectors to customize and extend your user flows via web APIs](api-connectors-overview.md)
109110
- [Add custom approval workflow to your user flow](self-service-sign-up-add-approvals.md)
111+
- [Learn more about initiating an OAuth 2.0 authorization code flow](../develop/v2-oauth2-auth-code-flow.md#request-an-authorization-code)

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: amycolannino
77
ms.service: active-directory
88
ms.topic: how-to
99
ms.workload: identity
10-
ms.date: 06/15/2022
10+
ms.date: 10/12/2022
1111
ms.subservice: hybrid
1212
ms.author: billmath
1313

@@ -19,7 +19,7 @@ ms.collection: M365-identity-device-management
1919
Group writeback allows you to write cloud groups back to your on-premises Active Directory instance by using Azure Active Directory (Azure AD) Connect sync. You can use this feature to manage groups in the cloud, while controlling access to on-premises applications and resources.
2020

2121
>[NOTE]
22-
>The Group writeback functionality is currently in Public Preview. We are collecting customer feedback and telemetry. Please refer to [the limitations]([#Understand limitations of public preview](https://learn.microsoft.com/azure/active-directory/hybrid/how-to-connect-group-writeback-v2#understand-limitations-of-public-preview) before you enable this funcitonality.
22+
>The Group writeback functionality is currently in Public Preview as we are collecting customer feedback and telemetry. Please refer to [the limitations](https://learn.microsoft.com/azure/active-directory/hybrid/how-to-connect-group-writeback-v2#understand-limitations-of-public-preview) before you enable this functionality.
2323
2424

2525
There are two versions of group writeback. The original version is in general availability and is limited to writing back Microsoft 365 groups to your on-premises Active Directory instance as distribution groups. The new, expanded version of group writeback is in public preview and enables the following capabilities:
@@ -121,8 +121,8 @@ If you plan to make changes to the default behavior, we recommend that you do so
121121

122122
## Understand limitations of public preview 
123123

124-
Although this release has undergone extensive testing, you might still encounter issues. One of the goals of this public preview release is to find and fix any issues before the feature moves to general availability. Please also note that any public preview functionality can still receive breaking changes which may require you to make changes to you configuration to continue using this feature. We may also decide to change certain functionality without prior notice.
125-
Microsoft provides support for this public preview release, but it might not be able to immediately fix issues that you encounter. For these reasons, we recommend that you do not deploy this release in your production environment. 
124+
Although this release has undergone extensive testing, you might still encounter issues. One of the goals of this public preview release is to find and fix any issues before the feature moves to general availability. Please also note that any public preview functionality can still receive breaking changes which may require you to make changes to you configuration to continue using this feature. We may also decide to change or remove certain functionality without prior notice.
125+
Microsoft provides support for this public preview release, but we might not be able to immediately fix issues that you encounter. For these reasons, we recommend that you do not deploy this release in your production environment. 
126126

127127
These limitations and known issues are specific to group writeback:
128128

articles/azure-netapp-files/application-volume-group-deploy-first-host.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: how-to
15-
ms.date: 11/19/2021
15+
ms.date: 10/13/2022
1616
ms.author: anfdocs
1717
---
1818
# Deploy the first SAP HANA host using application volume group for SAP HANA
@@ -23,9 +23,6 @@ This article describes how to deploy the first SAP HANA host using Azure NetApp
2323

2424
## Before you begin
2525

26-
> [!IMPORTANT]
27-
> Azure NetApp Files application volume group for SAP HANA is currently in preview. You need to submit a waitlist request for accessing the feature through the [**Azure NetApp Files application volume group for SAP HANA waitlist submission page**](https://aka.ms/anfavgpreviewsignup). Wait for an official confirmation email from the Azure NetApp Files team before using application volume group for SAP HANA.
28-
2926
You should understand the [requirements and considerations for application volume group for SAP HANA](application-volume-group-considerations.md).
3027

3128
Be sure to follow the **[pinning recommendations](https://aka.ms/HANAPINNING)** and have at least one HANA VM in the availability set started.

articles/azure-netapp-files/application-volume-group-introduction.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,15 +12,12 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: conceptual
15-
ms.date: 11/19/2021
15+
ms.date: 10/13/2022
1616
ms.author: anfdocs
1717
---
1818
# Understand Azure NetApp Files application volume group for SAP HANA
1919

20-
This article helps you understand the use cases and key features of Azure NetApp Files application volume group for SAP HANA.
21-
22-
> [!IMPORTANT]
23-
> Azure NetApp Files application volume group for SAP HANA is currently in preview. You need to submit a waitlist request for accessing the feature through the [**Azure NetApp Files application volume group for SAP HANA waitlist submission page**](https://aka.ms/anfavgpreviewsignup). Wait for an official confirmation email from the Azure NetApp Files team before using application volume group for SAP HANA.
20+
This article helps you understand the use cases and key features of Azure NetApp Files application volume group for SAP HANA.
2421

2522
Application volume group for SAP HANA enables you to deploy all volumes required to install and operate an SAP HANA database according to best practices. Instead of individually creating the required SAP HANA volumes (including data, log, shared, log-backup, and data-backup volumes), application volume group for SAP HANA creates these volumes in a single "atomic" call. The atomic call ensures that either all volumes or no volumes at all are created.
2623

articles/azure-netapp-files/whats-new.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,19 @@ ms.service: azure-netapp-files
1212
ms.workload: storage
1313
ms.tgt_pltfrm: na
1414
ms.topic: overview
15-
ms.date: 09/07/2022
15+
ms.date: 10/13/2022
1616
ms.author: anfdocs
1717
---
1818
# What's new in Azure NetApp Files
1919

2020
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
2121

22+
## October 2022
23+
24+
* [Application volume group for SAP HANA](application-volume-group-introduction.md) now generally available (GA)
25+
26+
The application volume group for SAP HANA feature is now generally available. You no longer need to register the feature to use it.
27+
2228
## August 2022
2329

2430
* [Standard network features](configure-network-features.md) are now generally available [in supported regions](azure-netapp-files-network-topologies.md#supported-regions).

articles/azure-portal/azure-portal-safelist-urls.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Allow the Azure portal URLs on your firewall or proxy server
33
description: To optimize connectivity between your network and the Azure portal and its services, we recommend you add these URLs to your allowlist.
4-
ms.date: 06/29/2022
4+
ms.date: 10/12/2022
55
ms.topic: conceptual
66
---
77

@@ -68,6 +68,7 @@ api.aadrm.com (Azure AD)
6868
api.loganalytics.io (Log Analytics Service)
6969
*.applicationinsights.azure.com (Application Insights Service)
7070
appservice.azure.com (Azure App Services)
71+
*.arc.azure.net (Azure Arc)
7172
asazure.windows.net (Analysis Services)
7273
bastion.azure.com (Azure Bastion Service)
7374
batch.azure.com (Azure Batch Service)

articles/azure-vmware/includes/azure-vmware-solutions-limits.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,19 +15,20 @@ The following table describes the maximum limits for Azure VMware Solution.
1515
| **Resource** | **Limit** |
1616
| :-- | :-- |
1717
| vSphere clusters per private cloud | 12 |
18-
| Minimum number of ESXi hosts per cluster | 3 |
19-
| Maximum number of ESXi hosts per cluster | 16 |
18+
| Minimum number of ESXi hosts per cluster | 3 (hard-limit) |
19+
| Maximum number of ESXi hosts per cluster | 16 (hard-limit) |
2020
| Maximum number of ESXi hosts per private cloud | 96 |
21-
| Maximum number of vCenter Servers per private cloud | 1 |
21+
| Maximum number of vCenter Servers per private cloud | 1 (hard-limit) |
2222
| Maximum number of HCX site pairings | 25 (any edition) |
2323
| Maximum number of Azure VMware Solution ExpressRoute max linked private clouds | 4<br />The virtual network gateway used determines the actual max linked private clouds. For more details, see [About ExpressRoute virtual network gateways](../../expressroute/expressroute-about-virtual-network-gateways.md) |
2424
| Maximum Azure VMware Solution ExpressRoute port speed | 10 Gbps<br />The virtual network gateway used determines the actual bandwidth. For more details, see [About ExpressRoute virtual network gateways](../../expressroute/expressroute-about-virtual-network-gateways.md) |
2525
| Maximum number of Azure Public IPv4 addresses assigned to NSX-T Data Center | 2,000 |
26+
| Maximum number of Azure VMware Solution Interconnects per private cloud | 10 |
2627
| vSAN capacity limits | 75% of total usable (keep 25% available for SLA) |
2728
| VMware Site Recovery Manager - Maximum number of protected Virtual Machines | 3,000 |
2829
| VMware Site Recovery Manager - Maximum number of Virtual Machines per recovery plan | 2,000 |
2930
| VMware Site Recovery Manager - Maximum number of protection groups per recovery plan | 250 |
30-
| VMware Site Recovery Manager - RPO Values | 5 min or higher * |
31+
| VMware Site Recovery Manager - RPO Values | 5 min or higher * (hard-limit) |
3132
| VMware Site Recovery Manager - Maximum number of virtual machines per protection group | 500 |
3233
| VMware Site Recovery Manager - Maximum number of recovery plans | 250 |
3334

0 commit comments

Comments
 (0)