Skip to content

Commit f419d74

Browse files
authored
Merge pull request #8030 from ovh/dev/remrozk/sap
SAP: Fix links
2 parents 210eb9f + 161e7fb commit f419d74

30 files changed

+30
-30
lines changed

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.de-de.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-asia.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-au.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-ca.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-gb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-ie.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-sg.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.en-us.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.es-es.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

pages/hosted_private_cloud/sap_on_ovhcloud/concept_sap_on_secnumcloud/guide.es-us.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Administrators can authenticate to the SAP HANA database using various methods,
8181

8282
It is recommended to restrict and monitor access to the SAP HANA database for administration through controlled and monitored entry points to improve security.
8383

84-
For more information about SAP HANA security, see the [SAP documentation](https://www.sap.com/documents/2016/06/3ea239ad-757c-0010-82c7-eda71af511fa.html).
84+
For more information about SAP HANA security, see the [SAP documentation](https://help.sap.com/docs/SAP_HANA_PLATFORM/b3ee5778bc2e4a089d3299b82ec762a7/c3d9889e3c9843bdb834e9eb56f1b041.html).
8585

8686
### 3 - SAP Application Servers
8787

0 commit comments

Comments
 (0)