diff --git a/src/pages/[platform]/start/account-setup/index.mdx b/src/pages/[platform]/start/account-setup/index.mdx index 42137965399..a225a1f1dc1 100644 --- a/src/pages/[platform]/start/account-setup/index.mdx +++ b/src/pages/[platform]/start/account-setup/index.mdx @@ -2,7 +2,8 @@ import { getCustomStaticPath } from '@/utils/getCustomStaticPath'; export const meta = { title: 'Configure AWS for local development', - description: 'Learn how to set up your AWS account and configure it locally for use with Amplify.', + description: + 'Learn how to set up your AWS account and configure it locally for use with Amplify.', platforms: [ 'android', 'angular', @@ -34,9 +35,9 @@ export function getStaticProps(context) { -This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows. +This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows. -Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys). +Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys). @@ -45,7 +46,6 @@ IAM Identity Center enables users to sign in using a single user identity to acc ### Users Users refers to the location where user identities and group information are stored and managed. IAM Identity Center can integrate with external identity sources like Microsoft Active Directory or use a built-in identity store provided by AWS. - ### Permission Set @@ -70,7 +70,6 @@ You can use temporary security credentials to make programmatic requests for AWS - ## Set up Identity Center Follow the steps below if **you have never set up AWS profiles before**. If you already have a profile, attach the `AmplifyBackendDeployFullAccess` managed policy to your [IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html). @@ -79,11 +78,11 @@ Follow the steps below if **you have never set up AWS profiles before**. If you Sign in to the AWS Console to access [IAM Identity Center page](https://console.aws.amazon.com/singlesignon/home) and choose **Enable**. - ![AWS IAM Identity Center page indicating the "enable" button.](/images/gen2/account-setup/sso-enable.png) +![AWS IAM Identity Center page indicating the "enable" button.](/images/gen2/account-setup/sso-enable.png) A dialog will open, prompting you to "Choose how to configure IAM Identity Center in your AWS environment." Select **Enable with AWS Organizations** and choose **Continue**. - ![AWS IAM Identity Center enable dialog with AWS Organizations, indicating to "continue".](/images/gen2/account-setup/sso-enable-dialog.png) +![AWS IAM Identity Center enable dialog with AWS Organizations, indicating to "continue".](/images/gen2/account-setup/sso-enable-dialog.png) Next, we are going to automate a number of steps that simulate the operations of setting up a user in the IdC console. To get started open CloudShell, located in the console footer. @@ -91,9 +90,10 @@ Next, we are going to automate a number of steps that simulate the operations of Paste the following command in the CloudShell terminal and enter an email address you would like to associate with this AWS account: -``` bash title="CloudShell" showLineNumbers={false} +```bash title="CloudShell" showLineNumbers={false} read -p "Enter email address: " user_email # hit enter ``` + ```console showLineNumbers={false} Enter email address: ``` @@ -134,8 +134,7 @@ Username: amplify-admin ![AWS IAM Identity Center dashboard indicating "permission sets" in the navigation pane.](/images/gen2/account-setup/sso-dashboard-highlight-permission-sets.png) - Select **Create permission set**. -- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**. -Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**. +- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**. Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**. ![AWS IAM Identity Center custom permission set page with the "AmplifyBackendDeployFullAccess" AWS managed policy selected.](/images/gen2/account-setup/sso-permission-set-custom.png) @@ -156,7 +155,7 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify ![AWS IAM Identity Center "AWS accounts" page with the management account checked.](/images/gen2/account-setup/sso-aws-accounts.png) - When prompted to assign a user or group, select the **Users** tab, select the user created in step 13, and choose **Next**. - + ![AWS IAM Identity Center "AWS accounts" page assigning "amplify-admin" to the management AWS account](/images/gen2/account-setup/sso-aws-accounts-add-user.png) - Assign the permission set created in step 9 and choose **Next**. @@ -168,11 +167,12 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify - Navigate to the copied URL and sign in as your user, _amplify-admin_. After signing in, you should have access to an AWS account. ![AWS IAM Identity Center access portal displaying an AWS account.](/images/gen2/account-setup/sso-access-portal.png) + ### 2. Create password for user - Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_. +Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_.