You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docsource/content.md
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ After initial authentication, temporary credentials are used by using the Assume
10
10
11
11
This integration also supports the reading of existing certificate ACM key/value pair tags during inventory and adding these tags when adding new certificates.
12
12
Modifying and adding ACM tags during certificate renewal, however, is NOT supported.
13
-
This is due to the fact that the AWS API does not allow for ACM tag modification when updating a certificate in one step.
13
+
This is because the AWS API does not allow for ACM tag modification when updating a certificate in one step.
14
14
This would need to be done in multiple steps, leading to the possibility of the certificate being left in an error state if any intermediate step were to fail.
15
15
However, while the modification/addition of ACM tags is not supported, all existing ACM tags WILL remain in place during renewal.
16
16
@@ -25,16 +25,16 @@ However, while the modification/addition of ACM tags is not supported, all exist
25
25
26
26
Field usage has changed in v3, notably:
27
27
*`ServerUsername` and `ServerPassword` are no longer used
28
-
* Specific fields for IAM and OAuth are defined for credentials of those type
28
+
* Specific fields for IAM and OAuth are defined for credentials of those types
29
29
*`Store Path` only allows a __single__ AWS Region to be defined
30
30
* The Entry Parameter for AWS Region is no longer used
31
31
*`Client Machine` requires the _full_ Role ARN to be used for Assume Role calls
32
32
33
33
As a result, previous Store Types are no longer supported, and Certificate Stores of those types need to be migrated to the v3 type.
34
-
Inventory jobs will need be to run after creating the new Certificate Stores to begin tracking those certificates again.
34
+
Inventory jobs will need to be to run after creating the new Certificate Stores to begin tracking those certificates again.
35
35
The deprecated Stores and Store Types can be deleted after they are no longer needed.
36
36
37
-
_Currently there is no provided migration utility to perform this programatically._
37
+
_Currently, there is no provided migration utility to perform this programmatically._
38
38
39
39
### Setting up AWS Authentication (Examples)
40
40
@@ -55,9 +55,9 @@ If the EC2 Role assigned to the instance is only to be used initially, and a new
55
55
then the `Assume new Role using Default SDK Auth` should also be selected.
56
56
57
57
### AWS Setup
58
-
_Note: In this scenario the AWS-ACM-v3 extension needs to be running inside of an EC2 instance._
58
+
_Note: In this scenario, the AWS-ACM-v3 extension needs to be running inside an EC2 instance._
59
59
1. Assign or note the existing IAM Role assigned to the EC2 instance running. [Found in EC2 here](docsource/images/ec2-instance-iam-role.gif).
60
-
2. Ensure a [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. [Example](docsource/images/ec2-role-arn-trust-relationship.gif).
60
+
2. Ensure a [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is set up for that role. [Example](docsource/images/ec2-role-arn-trust-relationship.gif).
61
61
3. Verify the permissions match the requirements for accessing ACM.
62
62
63
63
</details>
@@ -69,15 +69,15 @@ _Note: In this scenario the AWS-ACM-v3 extension needs to be running inside of a
69
69
Select the `Use OAuth` option for a certificate store to use an OAuth Identity Provider.
70
70
71
71
### AWS Setup
72
-
1. A 3rd party [Identity Provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](docsource/images/AWSIdentityProvider.gif) needs to be setup in AWS.
72
+
1. A 3rd party [Identity Provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](docsource/images/AWSIdentityProvider.gif) needs to be set up in AWS.
73
73
2. An [AWS Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) needs to be created to be used with your Identity Provider.
74
-
3. Ensure the [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role with the Identity Provider. [Example](docsource/images/AWSRole2.gif).
74
+
3. Ensure the [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is set up for that role with the Identity Provider. [Example](docsource/images/AWSRole2.gif).
75
75
4. Verify the permissions match the requirements for accessing ACM.
76
76
77
77
### OKTA Setup
78
-
1. Ensure your Authorization Server Is Setup in OKTA. Here is a [sample](docsource/images/OktaSampleAuthorizationServer.gif).
79
-
2. Ensure the appropriate scopes are setup in Okta. Here is a [sample](docsource/images/OktaSampleAuthorizationServer-scopes.gif).
80
-
3.Setup an Okta App with similar settings to [this](docsource/images/OktaApp1.gif) and [this](docsource/images/OktaApp2.gif).
78
+
1. Ensure your Authorization Server Is Set up in OKTA. Here is a [sample](docsource/images/OktaSampleAuthorizationServer.gif).
79
+
2. Ensure the appropriate scopes are set up in Okta. Here is a [sample](docsource/images/OktaSampleAuthorizationServer-scopes.gif).
80
+
3.Set up an Okta App with similar settings to [this](docsource/images/OktaApp1.gif) and [this](docsource/images/OktaApp2.gif).
81
81
82
82
</details>
83
83
@@ -89,7 +89,7 @@ Select the `Use IAM` option for a certificate store to use an IAM User credentia
89
89
90
90
### AWS Setup
91
91
1. An [AWS Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) to Assume with your IAM User needs to be created.
92
-
2. Ensure a [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. [Example](docsource/images/AssumeRoleTrust.gif).
92
+
2. Ensure a [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is set up for that role. [Example](docsource/images/AssumeRoleTrust.gif).
93
93
3. AWS does not support programmatic access for AWS SSO accounts. The account used here must be a [standard AWS IAM User](docsource/images/UserAccount.gif) with an Access Key credential type.
94
94
4. Verify the permissions match the requirements for accessing ACM.
0 commit comments