Skip to content

Commit e72c3f5

Browse files
author
Lee Fine
committed
ab#69134
1 parent adc8eda commit e72c3f5

10 files changed

+9
-9
lines changed

docsource/content.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,24 +31,24 @@ As one option for #3, to set up Role Auth for an EC2 instance, follow the steps
3131
<summary>[Deprecated] AWS Certificate Manager with Okta Auth Configuration <code>AwsCerManO</code></summary>
3232

3333
### AWS Setup
34-
1. A 3rd party [identity provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](/Images/AWSIdentityProvider.gif) needs to be setup in AWS for each account.
35-
2. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) similar to [this](/Images/AWSRole1.gif) needs Added for each AWS account.
36-
3. Ensure the [trust relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like [this](/Images/AWSRole2.gif).
34+
1. A 3rd party [identity provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](images/AWSIdentityProvider.gif) needs to be setup in AWS for each account.
35+
2. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) similar to [this](images/AWSRole1.gif) needs Added for each AWS account.
36+
3. Ensure the [trust relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like [this](images/AWSRole2.gif).
3737

3838
### OKTA Setup
39-
1. Ensure your Authorization Server Is Setup in OKTA. Here is a [sample](/Images/OktaSampleAuthorizationServer.gif).
40-
2. Ensure the appropriate scopes are setup in Okta. Here is a [sample](/Images/OktaSampleAuthorizationServer-scopes.gif).
41-
3. Setup an Okta App with similar settings to [this](/Images/OktaApp1.gif) and [this](/Images/OktaApp2.gif).
39+
1. Ensure your Authorization Server Is Setup in OKTA. Here is a [sample](images/OktaSampleAuthorizationServer.gif).
40+
2. Ensure the appropriate scopes are setup in Okta. Here is a [sample](images/OktaSampleAuthorizationServer-scopes.gif).
41+
3. Setup an Okta App with similar settings to [this](images/OktaApp1.gif) and [this](images/OktaApp2.gif).
4242

4343
</details>
4444

4545
<details>
4646
<summary>[Deprecated] AWS Certificate Manager with IAM Auth Configuration <code>AwsCerManA</code></summary>
4747

4848
### AWS Setup
49-
1. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) Needs Added for the permissions you want to grant, see [sample](/Images/AWSRole1.gif).
50-
2. A [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like something like [this](/Images/AssumeRoleTrust.gif).
51-
3. AWS does not support programmatic access for AWS SSO accounts. The account used here must be a [standard AWS IAM User](/Images/UserAccount.gif) with an Access Key credential type.
49+
1. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) Needs Added for the permissions you want to grant, see [sample](images/AWSRole1.gif).
50+
2. A [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like something like [this](images/AssumeRoleTrust.gif).
51+
3. AWS does not support programmatic access for AWS SSO accounts. The account used here must be a [standard AWS IAM User](images/UserAccount.gif) with an Access Key credential type.
5252

5353
</details>
5454

File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.

0 commit comments

Comments
 (0)