Skip to content

Commit 844e20e

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into otherFixes
2 parents f869c04 + a672984 commit 844e20e

File tree

4 files changed

+24
-24
lines changed

4 files changed

+24
-24
lines changed

articles/active-directory/saas-apps/appdynamics-tutorial.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/25/2023
1313
ms.author: jeedes
1414
---
1515
# Tutorial: Azure Active Directory integration with AppDynamics
@@ -73,14 +73,17 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7373

7474
4. On the **Basic SAML Configuration** section, perform the following steps:
7575

76-
a. In the **Sign on URL** text box, type a URL using the following pattern:
77-
`https://<companyname>.saas.appdynamics.com?accountName=<companyname>`
78-
79-
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
76+
a. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
8077
`https://<companyname>.saas.appdynamics.com/controller`
8178

79+
b. In the **Reply URL (Assertion Consumer Service URL)** text box, type a URL using the following pattern:
80+
`https://<companyname>.saas.appdynamics.com/controller/saml-auth?accountName=<companyname>`
81+
82+
c. In the **Sign on URL** text box, type a URL using the following pattern:
83+
`https://<companyname>.saas.appdynamics.com/?accountName=<companyname>`
84+
8285
> [!NOTE]
83-
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [AppDynamics Client support team](https://www.appdynamics.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
86+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [AppDynamics Client support team](https://www.appdynamics.com/support/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
8487
8588
4. On the **Set up Single Sign-On with SAML** page, in the **SAML Signing Certificate** section, click **Download** to download the **Certificate (Base64)** from the given options as per your requirement and save it on your computer.
8689

@@ -156,4 +159,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
156159

157160
## Next steps
158161

159-
Once you configure AppDynamics you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).
162+
Once you configure AppDynamics you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Defender for Cloud Apps](/cloud-app-security/proxy-deployment-any-app).

articles/active-directory/saas-apps/slack-tutorial.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/25/2023
1313
ms.author: jeedes
1414
---
1515

@@ -38,7 +38,7 @@ To get started, you need the following items:
3838

3939
In this tutorial, you configure and test Azure AD SSO in a test environment.
4040

41-
* Slack supports **SP** initiated SSO.
41+
* Slack supports **SP (service provider)** initiated SSO.
4242
* Slack supports **Just In Time** user provisioning.
4343
* Slack supports [**Automated** user provisioning](./slack-provisioning-tutorial.md).
4444

@@ -56,8 +56,6 @@ To configure the integration of Slack into Azure AD, you need to add Slack from
5656
1. In the **Add from the gallery** section, type **Slack** in the search box.
5757
1. Select **Slack** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
5858

59-
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. [Learn more about Microsoft 365 wizards.](/microsoft-365/admin/misc/azure-ad-setup-guides)
60-
6159
Alternatively, you can also use the [Enterprise App Configuration Wizard](https://portal.office.com/AdminPortal/home?Q=Docs#/azureadappintegration). In this wizard, you can add an application to your tenant, add users/groups to the app, assign roles, as well as walk through the SSO configuration as well. You can learn more about O365 wizards [here](/microsoft-365/admin/misc/azure-ad-setup-guides?view=o365-worldwide&preserve-view=true).
6260

6361
## Configure and test Azure AD SSO for Slack
@@ -91,7 +89,7 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
9189
b. In the **Identifier (Entity ID)** text box, type the URL:
9290
`https://slack.com`
9391

94-
c. For **Reply URL**, enter one of the following URL pattern:
92+
c. For **Reply URL**, enter one of the following URL patterns:
9593

9694
| Reply URL|
9795
|----------|
@@ -162,7 +160,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
162160

163161
![Setup configuration](common/setup-sso.png)
164162

165-
3. If you want to setup Slack manually, in a different web browser window, sign in to your Slack company site as an administrator.
163+
3. If you want to set up Slack manually, in a different web browser window, sign in to your Slack company site as an administrator.
166164

167165
2. click on your workspace name in the top left, then go to **Settings & administration** -> **Workspace settings**.
168166

articles/active-directory/saas-apps/valid8me-tutorial.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: saas-app-tutorial
1010
ms.workload: identity
1111
ms.topic: tutorial
12-
ms.date: 11/21/2022
12+
ms.date: 01/25/2023
1313
ms.author: jeedes
1414

1515
---
@@ -78,15 +78,10 @@ Follow these steps to enable Azure AD SSO in the Azure portal.
7878

7979
1. On the **Basic SAML Configuration** section, the user does not have to perform any step as the app is already pre-integrated with Azure.
8080

81-
1. Click **Set additional URLs** and perform the following step, if you wish to configure the application in **SP** initiated mode:
81+
1. If you wish to configure the application in **SP** initiated mode:
8282

83-
In the **Sign on URL** textbox, type a URL using one of the following patterns:
84-
85-
| **Sign on URL** |
86-
|------------|
87-
| `https://login.valid8me.com` |
88-
| `https://login.valid8me.com/?idp=https://sts.windows.net/${TenantID}/` |
89-
| `https://<<client_name>>.valid8me.com` |
83+
In the **Sign on URL (Optional)** text box, type a URL using the following pattern:
84+
`https://login.valid8me.com/?idp=https://sts.windows.net/${TenantID}/`
9085

9186
> [!Note]
9287
> This value is not real. Update this value with the actual Sign on URL. Contact [valid8Me support team](mailto:[email protected]) to get the value. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.

articles/azure-vmware/attach-azure-netapp-files-to-azure-vmware-solution-hosts.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Attach Azure NetApp Files datastores to Azure VMware Solution hosts
33
description: Learn how to create Azure NetApp Files-based NFS datastores for Azure VMware Solution hosts.
44
ms.topic: how-to
55
ms.service: azure-vmware
6-
ms.date: 01/13/2023
6+
ms.date: 01/25/2023
77
ms.custom: references_regions
88
---
99

@@ -90,7 +90,7 @@ Under **Manage**, select **Storage**.
9090
:::image type="content" source="media/attach-netapp-files-to-cloud/connect-netapp-files-portal-experience-1.png" alt-text="Image shows the navigation to Connect Azure NetApp Files volume pop-up window." lightbox="media/attach-netapp-files-to-cloud/connect-netapp-files-portal-experience-1.png":::
9191

9292
1. Verify the protocol is NFS. You'll need to verify the virtual network and subnet to ensure connectivity to the Azure VMware Solution private cloud.
93-
1. Under **Associated cluster**, select the **Client cluster** to associate the NFS volume as a datastore
93+
1. Under **Associated cluster**, in the **Client cluster** field, select one or more clusters to associate the volume as a datastore.
9494
1. Under **Data store**, create a personalized name for your **Datastore name**.
9595
1. When the datastore is created, you should see all of your datastores in the **Storage**.
9696
2. You'll also notice that the NFS datastores are added in vCenter.
@@ -208,3 +208,7 @@ Now that you've attached a datastore on Azure NetApp Files-based NFS volume to y
208208
- **How are the datastores charged, is there an additional charge?**
209209

210210
Azure NetApp Files NFS volumes that are used as datastores will be billed following the [capacity pool based billing model](../azure-netapp-files/azure-netapp-files-cost-model.md). Billing will depend on the service level. There's no extra charge for using Azure NetApp Files NFS volumes as datastores.
211+
212+
- **Can a single Azure NetApp Files datastore be added to multiple clusters within the same Azure VMware Solution SDDC?**
213+
214+
Yes, you can select multiple datastores at the time of datastore creation. Additional clusters may be added or removed after the initial creation as well.

0 commit comments

Comments
 (0)