Skip to content

Commit 3c09668

Browse files
committed
Update 2
1 parent 2c85cd0 commit 3c09668

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+2576
-2436
lines changed

content/1-prerequisite/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,9 +79,9 @@ Root
7979
├── Sandbox account 1
8080
└── Sandbox account 2
8181
```
82-
![architect](/images/anh2.jpg "Architect")
82+
![architect](/resources/_gen/images/anh2.jpg "Architect")
8383

84-
![architect](/images/Anh1.jpg "Architect")
84+
![architect](/resources/_gen/images/Anh1.jpg "Architect")
8585

8686
- Check in the Settings section of AWS Organizations console:
8787
- Consolidated billing is enabled

content/2-Deploy the Solution/_index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Consists of 4 stacks
3737

3838
Each CloudFormation stack has dependencies with other stacks and is deployed on different accounts, ensuring solution components work in coordination.
3939

40-
![architect](/images/stack-relationships.png "Architect")
40+
![architect](/resources/_gen/images/stack-relationships.png "Architect")
4141

4242
#### CloudFormation Templates
4343

@@ -71,7 +71,7 @@ Deploying the AccountPool stack will create the organization structure and polic
7171
- **HubAccountId:** This is the AWS account ID where you will deploy two of the four stacks. To see all accounts in the organization, go to AWS Organizations in the console, choose an account as hub and note the ID for use in step 5 and subsequent steps.
7272
- **ParentOuID:** This is the ID of the root or organizational unit (OU) where Innovation Sandbox OUs will be created. To find this ID, open AWS Organizations, the organization structure will display the ID under each OU name. You can also use the root organization ID.
7373

74-
![architect](/images/organiza.jpg "Architect")
74+
![architect](/resources/_gen/images/organiza.jpg "Architect")
7575

7676
**Initialize stack**
7777

content/3-Configure the Solution/_index.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
7979

8080
#### Important note
8181

82-
- Perform all steps below in the **organization management account** – where you have configured AWS IAM Identity Center.
82+
- Perform all steps below in the **organization management account** where you have configured AWS IAM Identity Center.
8383
- Ensure you are in the correct **home Region** chosen for the entire system.
8484

8585
#### Configuration steps
@@ -89,32 +89,32 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
8989
- Open **AWS IAM Identity Center console** with organization management account.
9090
- In navigation bar, choose **Applications**.
9191
- Switch to **Customer managed** tab.
92-
![architect](/images/organiza.jpg "Architect")
92+
![architect](/resources/_gen/images/organiza.jpg "Architect")
9393

9494
**2. Add new application**
9595

9696
- Choose **Add application**.
9797
- Choose **I have an application I want to set up**.
9898
- Choose **SAML 2.0**, then click **Next**.
9999

100-
![architect](/images/Buoc3.png "Architect")
100+
![architect](/resources/_gen/images/Buoc3.png "Architect")
101101

102102
**3. Configure application**
103103

104104
- On configuration page, enter **Display name** (example: MyISB app) and description for application.
105105
-
106-
![architect](/images/Buoc5.png "Architect")
106+
![architect](/resources/_gen/images/Buoc5.png "Architect")
107107

108108
- In **IAM Identity Center metadata** section:
109109
- Download **SAML metadata file** (identity provider metadata).
110110
- Download **certificate** (identity provider certificate).
111111

112-
![architect](/images/Buoc6.png "Architect")
112+
![architect](/resources/_gen/images/Buoc6.png "Architect")
113113

114114

115-
- Note the **Sign-in URL** and **Sign-out URL** – will be needed when configuring on hub account.
115+
- Note the **Sign-in URL** and **Sign-out URL** will be needed when configuring on hub account.
116116

117-
![architect](/images/Buoc7.png "Architect")
117+
![architect](/resources/_gen/images/Buoc7.png "Architect")
118118

119119
**4. Enter metadata information for application**
120120

@@ -125,7 +125,7 @@ Configuring SAML 2.0 integration between AWS IAM Identity Center and Innovation
125125
|-------------------------|-------------------------------------------------------------------------------------------------------|
126126
| Application ACS URL | `{ISB_WEB_URL}/api/auth/login/callback` (Replace `{ISB_WEB_URL}` with saved CloudFrontDistributionUrl, example: `https://duyXXXXXXXeh.cloudfront.net/api/auth/login/callback`) |
127127
| Application SAML audience | Application identifier value (can use namespace name or initial stack name, example: `Isb-dev-namespace-Audience`). Save this value to configure AppConfig on hub account. |
128-
![architect](/images/Buoc8.png "Architect")
128+
![architect](/resources/_gen/images/Buoc8.png "Architect")
129129
**5. Complete configuration**
130130

131131
- Click **Submit**.
@@ -178,7 +178,7 @@ Setting up users and groups in AWS IAM Identity Center helps control access and
178178
- `{NAMESPACE}_IsbAdminsGroup`
179179
- Click **Add user to 1 group** to complete.
180180

181-
![architect](/images/users-and-groups.png "Architect")
181+
![architect](/resources/_gen/images/users-and-groups.png "Architect")
182182

183183
**Note:**
184184
To test all three user roles (user personas), ensure you have at least three users, each belonging to a different group.
@@ -198,7 +198,7 @@ Configuring the Innovation Sandbox on AWS web application helps activate user au
198198
- Choose **Create** to create a new hosted configuration version.
199199

200200

201-
![architect](/images/appconfig.png "Architect")
201+
![architect](/resources/_gen/images/appconfig.png "Architect")
202202

203203
**Update configuration:**
204204
- Set `maintenanceMode` value to `false` to open application for users.
@@ -242,7 +242,7 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
242242

243243
#### Important note
244244

245-
- Perform these steps in the **organization management account** – where you have configured AWS IAM Identity Center.
245+
- Perform these steps in the **organization management account** where you have configured AWS IAM Identity Center.
246246
- Ensure you are in the correct **home Region** chosen for the entire system.
247247

248248
#### Steps to Onboard Sandbox Accounts
@@ -257,7 +257,7 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
257257
- Find the accounts you want to move into sandbox environment. You can browse by OU structure or choose **List** to see flat account list.
258258
- **Note:** Do not select organization management account or hub account.
259259

260-
![architect](/images/account-onboarding.png "Architect")
260+
![architect](/resources/_gen/images/account-onboarding.png "Architect")
261261

262262
**3. Move accounts to Entry OU**
263263

@@ -272,4 +272,4 @@ Onboarding sandbox accounts is the final configuration step to complete the Inno
272272
- Sandbox accounts have been moved to the correct OU in the Innovation Sandbox on AWS organization structure.
273273
- Related control policies and configurations will automatically be applied to these accounts.
274274

275-
Properly onboarding accounts into Entry OU ensures the sandbox environment operates separately, securely and complies with organization governance policies.
275+
Properly onboarding accounts into Entry OU ensures the sandbox environment operates separately, securely and complies with organization governance policies.

0 commit comments

Comments
 (0)