Skip to content

Commit 2c85cd0

Browse files
committed
Fix image paths for GitHub Pages
1 parent b5177f5 commit 2c85cd0

45 files changed

Lines changed: 695 additions & 466 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

config.toml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# Change the default theme to be use when building the site with Hugo
22
theme = "hugo-theme-learn"
3+
baseURL = ""
34

45
# For search functionality
56
[outputs]

content/1-prerequisite/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,9 @@ Root
7979
├── Sandbox account 1
8080
└── Sandbox account 2
8181
```
82-
![architect](/resources/_gen/images/anh2.jpg "Architect")
82+
![architect](/images/anh2.jpg "Architect")
8383

84-
![architect](/resources/_gen/images/Anh1.jpg "Architect")
84+
![architect](/images/Anh1.jpg "Architect")
8585

8686
- Check in the Settings section of AWS Organizations console:
8787
- Consolidated billing is enabled

content/1-prerequisite/_index.vi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,9 @@ Root
7979
├── Sandbox account 1
8080
└── Sandbox account 2
8181
```
82-
![architect](/resources/_gen/images/anh2.jpg "Architect")
82+
![architect](/images/anh2.jpg "Architect")
8383

84-
![architect](/resources/_gen/images/Anh1.jpg "Architect")
84+
![architect](/images/Anh1.jpg "Architect")
8585

8686
- Kiểm tra trong phần Settings của AWS Organizations console:
8787
- Đã bật consolidated billing

content/2-Deploy the Solution/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Consists of 4 stacks
3737

3838
Each CloudFormation stack has dependencies with other stacks and is deployed on different accounts, ensuring solution components work in coordination.
3939

40-
![architect](/resources/_gen/images/stack-relationships.png "Architect")
40+
![architect](/images/stack-relationships.png "Architect")
4141

4242
#### CloudFormation Templates
4343

@@ -71,7 +71,7 @@ Deploying the AccountPool stack will create the organization structure and polic
7171
- **HubAccountId:** This is the AWS account ID where you will deploy two of the four stacks. To see all accounts in the organization, go to AWS Organizations in the console, choose an account as hub and note the ID for use in step 5 and subsequent steps.
7272
- **ParentOuID:** This is the ID of the root or organizational unit (OU) where Innovation Sandbox OUs will be created. To find this ID, open AWS Organizations, the organization structure will display the ID under each OU name. You can also use the root organization ID.
7373

74-
![architect](/resources/_gen/images/organiza.jpg "Architect")
74+
![architect](/images/organiza.jpg "Architect")
7575

7676
**Initialize stack**
7777

content/2-Deploy the Solution/_index.vi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Việc triển khai bao gồm bốn stack CloudFormation, mỗi stack xây dựn
3838

3939
Mỗi stack CloudFormation có mối quan hệ phụ thuộc với các stack khác và được triển khai trên các tài khoản khác nhau, đảm bảo các thành phần của giải pháp hoạt động phối hợp.
4040

41-
![architect](/resources/_gen/images/stack-relationships.png "Architect")
41+
![architect](/images/stack-relationships.png "Architect")
4242

4343
#### Mẫu Template CloudFormation
4444

@@ -80,7 +80,7 @@ Triển khai AccountPool stack là bước đầu tiên trong tài khoản quả
8080
- **HubAccountId:** Đây là ID tài khoản AWS nơi bạn sẽ triển khai hai trong bốn stack. Để xem tất cả các tài khoản trong tổ chức, vào AWS Organizations trong console, chọn một tài khoản làm hub và ghi lại ID để sử dụng ở bước 5 và các bước sau.
8181
- **ParentOuID:** Đây là ID của root hoặc organizational unit (OU) nơi các OU của Innovation Sandbox sẽ được tạo. Để tìm ID này, mở AWS Organizations, cấu trúc tổ chức sẽ hiển thị ID dưới tên từng OU. Bạn cũng có thể dùng root organization ID.
8282

83-
![architect](/resources/_gen/images/organiza.jpg "Architect")
83+
![architect](/images/organiza.jpg "Architect")
8484

8585
**Khởi tạo stack**
8686

content/3-Configure the Solution/_index.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
+++
1+
+++
22
title = "Configure the Solution"
33
date = 2025
44
weight = 3
@@ -79,7 +79,7 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
7979

8080
#### Important note
8181

82-
- Perform all steps below in the **organization management account** where you have configured AWS IAM Identity Center.
82+
- Perform all steps below in the **organization management account** – where you have configured AWS IAM Identity Center.
8383
- Ensure you are in the correct **home Region** chosen for the entire system.
8484

8585
#### Configuration steps
@@ -89,32 +89,32 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
8989
- Open **AWS IAM Identity Center console** with organization management account.
9090
- In navigation bar, choose **Applications**.
9191
- Switch to **Customer managed** tab.
92-
![architect](/resources/_gen/images/organiza.jpg "Architect")
92+
![architect](/images/organiza.jpg "Architect")
9393

9494
**2. Add new application**
9595

9696
- Choose **Add application**.
9797
- Choose **I have an application I want to set up**.
9898
- Choose **SAML 2.0**, then click **Next**.
9999

100-
![architect](/resources/_gen/images/Buoc3.png "Architect")
100+
![architect](/images/Buoc3.png "Architect")
101101

102102
**3. Configure application**
103103

104104
- On configuration page, enter **Display name** (example: MyISB app) and description for application.
105105
-
106-
![architect](/resources/_gen/images/Buoc5.png "Architect")
106+
![architect](/images/Buoc5.png "Architect")
107107

108108
- In **IAM Identity Center metadata** section:
109109
- Download **SAML metadata file** (identity provider metadata).
110110
- Download **certificate** (identity provider certificate).
111111

112-
![architect](/resources/_gen/images/Buoc6.png "Architect")
112+
![architect](/images/Buoc6.png "Architect")
113113

114114

115-
- Note the **Sign-in URL** and **Sign-out URL** will be needed when configuring on hub account.
115+
- Note the **Sign-in URL** and **Sign-out URL** – will be needed when configuring on hub account.
116116

117-
![architect](/resources/_gen/images/Buoc7.png "Architect")
117+
![architect](/images/Buoc7.png "Architect")
118118

119119
**4. Enter metadata information for application**
120120

@@ -125,7 +125,7 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
125125
|-------------------------|-------------------------------------------------------------------------------------------------------|
126126
| Application ACS URL | `{ISB_WEB_URL}/api/auth/login/callback` (Replace `{ISB_WEB_URL}` with saved CloudFrontDistributionUrl, example: `https://duyXXXXXXXeh.cloudfront.net/api/auth/login/callback`) |
127127
| Application SAML audience | Application identifier value (can use namespace name or initial stack name, example: `Isb-dev-namespace-Audience`). Save this value to configure AppConfig on hub account. |
128-
![architect](/resources/_gen/images/Buoc8.png "Architect")
128+
![architect](/images/Buoc8.png "Architect")
129129
**5. Complete configuration**
130130

131131
- Click **Submit**.
@@ -178,7 +178,7 @@ Setting up users and groups in AWS IAM Identity Center helps control access and
178178
- `{NAMESPACE}_IsbAdminsGroup`
179179
- Click **Add user to 1 group** to complete.
180180

181-
![architect](/resources/_gen/images/users-and-groups.png "Architect")
181+
![architect](/images/users-and-groups.png "Architect")
182182

183183
**Note:**
184184
To test all three user roles (user personas), ensure you have at least three users, each belonging to a different group.
@@ -198,7 +198,7 @@ Configuring the Innovation Sandbox on AWS web application helps activate user au
198198
- Choose **Create** to create a new hosted configuration version.
199199

200200

201-
![architect](/resources/_gen/images/appconfig.png "Architect")
201+
![architect](/images/appconfig.png "Architect")
202202

203203
**Update configuration:**
204204
- Set `maintenanceMode` value to `false` to open application for users.
@@ -242,7 +242,7 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
242242

243243
#### Important note
244244

245-
- Perform these steps in the **organization management account** where you have configured AWS IAM Identity Center.
245+
- Perform these steps in the **organization management account** – where you have configured AWS IAM Identity Center.
246246
- Ensure you are in the correct **home Region** chosen for the entire system.
247247

248248
#### Steps to Onboard Sandbox Accounts
@@ -257,7 +257,7 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
257257
- Find the accounts you want to move into sandbox environment. You can browse by OU structure or choose **List** to see flat account list.
258258
- **Note:** Do not select organization management account or hub account.
259259

260-
![architect](/resources/_gen/images/account-onboarding.png "Architect")
260+
![architect](/images/account-onboarding.png "Architect")
261261

262262
**3. Move accounts to Entry OU**
263263

@@ -272,4 +272,4 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
272272
- Sandbox accounts have been moved to the correct OU in the Innovation Sandbox on AWS organization structure.
273273
- Related control policies and configurations will automatically be applied to these accounts.
274274

275-
Properly onboarding accounts into Entry OU ensures the sandbox environment operates separately, securely and complies with organization governance policies.
275+
Properly onboarding accounts into Entry OU ensures the sandbox environment operates separately, securely and complies with organization governance policies.

0 commit comments

Comments
 (0)