diff --git a/src/pages/[platform]/start/account-setup/index.mdx b/src/pages/[platform]/start/account-setup/index.mdx
index 42137965399..a225a1f1dc1 100644
--- a/src/pages/[platform]/start/account-setup/index.mdx
+++ b/src/pages/[platform]/start/account-setup/index.mdx
@@ -2,7 +2,8 @@ import { getCustomStaticPath } from '@/utils/getCustomStaticPath';
export const meta = {
title: 'Configure AWS for local development',
- description: 'Learn how to set up your AWS account and configure it locally for use with Amplify.',
+ description:
+ 'Learn how to set up your AWS account and configure it locally for use with Amplify.',
platforms: [
'android',
'angular',
@@ -34,9 +35,9 @@ export function getStaticProps(context) {
-This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows.
+This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows.
-Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys).
+Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys).
@@ -45,7 +46,6 @@ IAM Identity Center enables users to sign in using a single user identity to acc
### Users
Users refers to the location where user identities and group information are stored and managed. IAM Identity Center can integrate with external identity sources like Microsoft Active Directory or use a built-in identity store provided by AWS.
-
### Permission Set
@@ -70,7 +70,6 @@ You can use temporary security credentials to make programmatic requests for AWS
-
## Set up Identity Center
Follow the steps below if **you have never set up AWS profiles before**. If you already have a profile, attach the `AmplifyBackendDeployFullAccess` managed policy to your [IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html).
@@ -79,11 +78,11 @@ Follow the steps below if **you have never set up AWS profiles before**. If you
Sign in to the AWS Console to access [IAM Identity Center page](https://console.aws.amazon.com/singlesignon/home) and choose **Enable**.
- 
+
A dialog will open, prompting you to "Choose how to configure IAM Identity Center in your AWS environment." Select **Enable with AWS Organizations** and choose **Continue**.
- 
+
Next, we are going to automate a number of steps that simulate the operations of setting up a user in the IdC console. To get started open CloudShell, located in the console footer.
@@ -91,9 +90,10 @@ Next, we are going to automate a number of steps that simulate the operations of
Paste the following command in the CloudShell terminal and enter an email address you would like to associate with this AWS account:
-``` bash title="CloudShell" showLineNumbers={false}
+```bash title="CloudShell" showLineNumbers={false}
read -p "Enter email address: " user_email # hit enter
```
+
```console showLineNumbers={false}
Enter email address:
```
@@ -134,8 +134,7 @@ Username: amplify-admin

- Select **Create permission set**.
-- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**.
-Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**.
+- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**. Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**.

@@ -156,7 +155,7 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify

- When prompted to assign a user or group, select the **Users** tab, select the user created in step 13, and choose **Next**.
-
+

- Assign the permission set created in step 9 and choose **Next**.
@@ -168,11 +167,12 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify
- Navigate to the copied URL and sign in as your user, _amplify-admin_. After signing in, you should have access to an AWS account.

+
### 2. Create password for user
- Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_.
+Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_.
@@ -188,11 +188,10 @@ Now, set up an AWS profile that is linked to the user you just created on your l
Install the [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html).
-
-In your browser, download the macOS pkg file:
+In your browser, download the macOS pkg file:
[Install on Mac](https://awscli.amazonaws.com/AWSCLIV2.pkg)
@@ -220,7 +219,7 @@ unzip awscliv2.zip
### 4. Set up local AWS profile
-Open your terminal, you are ready to configure an AWS profile that uses the SSO user. Use the information from CloudShell to populate the information below.
+Open your terminal, you are ready to configure an AWS profile that uses the SSO user. Use the information from CloudShell to populate the information below.
```console title="Terminal" showLineNumbers={false}
//highlight-next-line
@@ -232,11 +231,11 @@ aws configure sso
| SSO registration scopes [sso:account:access]:
| Attempting to automatically open the SSO authorization page in your default browser.
| If the browser does not open or you wish to use a different device to authorize this request, open the following URL:
-|
+|
| https://device.sso.us-east-2.amazonaws.com/
-|
+|
| Then enter the code:
-|
+|
| SOME-CODE
## browser opens
@@ -278,17 +277,15 @@ sso_region =
sso_registration_scopes = sso:account:access
```
-
### 5. Bootstrap your AWS account
-Now you are ready to use this AWS profile with AWS Amplify. Open your Amplify project and start the sandbox. If you have multiple local profiles or named your profile something other than `default`, you can specify a profile with `--profile`.
-
+Now you are ready to use this AWS profile with AWS Amplify. Open your Amplify project and start the sandbox. If you have multiple local profiles or named your profile something other than `default`, you can specify a profile with `--profile`.
```bash title="Terminal" showLineNumbers={false}
// highlight-next-line
npx ampx sandbox
-# OR
+# OR
// highlight-next-line
npx ampx sandbox --profile
@@ -305,8 +302,7 @@ Bootstrapping is the process of provisioning resources for the AWS CDK before yo

-During the first-time setup, `npx ampx sandbox` will ask you to sign in to the AWS Management Console. Once you're signed in, you will be redirected to the Amplify console. On the **Create new app** page, choose **Initialize setup now**. It may take a few minutes for the bootstrapping process to complete.
-
+During the first-time setup, `npx ampx sandbox` will ask you to sign in to the AWS Management Console. You must sign in as the account root user or as a user that has AdministratorAccess. Once signed in, you will be redirected to the Amplify console. On the **Create new app** page, choose **Initialize setup now**. It may take a few minutes for the bootstrapping process to complete.
