Skip to content

Commit 2073dbb

Browse files
author
Lee Fine
committed
Merge branch 'ab#69134' of https://github.com/Keyfactor/aws-orchestrator into ab#69134
2 parents 4c7e4ba + 23f1516 commit 2073dbb

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -75,24 +75,24 @@ As one option for #3, to set up Role Auth for an EC2 instance, follow the steps
7575
<summary>[Deprecated] AWS Certificate Manager with Okta Auth Configuration <code>AwsCerManO</code></summary>
7676

7777
### AWS Setup
78-
1. A 3rd party [identity provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](/Images/AWSIdentityProvider.gif) needs to be setup in AWS for each account.
79-
2. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) similar to [this](/Images/AWSRole1.gif) needs Added for each AWS account.
80-
3. Ensure the [trust relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like [this](/Images/AWSRole2.gif).
78+
1. A 3rd party [identity provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html) similar to [this](images/AWSIdentityProvider.gif) needs to be setup in AWS for each account.
79+
2. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) similar to [this](images/AWSRole1.gif) needs Added for each AWS account.
80+
3. Ensure the [trust relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like [this](images/AWSRole2.gif).
8181

8282
### OKTA Setup
83-
1. Ensure your Authorization Server Is Setup in OKTA. Here is a [sample](/Images/OktaSampleAuthorizationServer.gif).
84-
2. Ensure the appropriate scopes are setup in Okta. Here is a [sample](/Images/OktaSampleAuthorizationServer-scopes.gif).
85-
3. Setup an Okta App with similar settings to [this](/Images/OktaApp1.gif) and [this](/Images/OktaApp2.gif).
83+
1. Ensure your Authorization Server Is Setup in OKTA. Here is a [sample](images/OktaSampleAuthorizationServer.gif).
84+
2. Ensure the appropriate scopes are setup in Okta. Here is a [sample](images/OktaSampleAuthorizationServer-scopes.gif).
85+
3. Setup an Okta App with similar settings to [this](images/OktaApp1.gif) and [this](images/OktaApp2.gif).
8686

8787
</details>
8888

8989
<details>
9090
<summary>[Deprecated] AWS Certificate Manager with IAM Auth Configuration <code>AwsCerManA</code></summary>
9191

9292
### AWS Setup
93-
1. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) Needs Added for the permissions you want to grant, see [sample](/Images/AWSRole1.gif).
94-
2. A [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like something like [this](/Images/AssumeRoleTrust.gif).
95-
3. AWS does not support programmatic access for AWS SSO accounts. The account used here must be a [standard AWS IAM User](/Images/UserAccount.gif) with an Access Key credential type.
93+
1. An Aws [Role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-user.html) Needs Added for the permissions you want to grant, see [sample](images/AWSRole1.gif).
94+
2. A [Trust Relationship](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/edit_trust.html) is setup for that role. Should look like something like [this](images/AssumeRoleTrust.gif).
95+
3. AWS does not support programmatic access for AWS SSO accounts. The account used here must be a [standard AWS IAM User](images/UserAccount.gif) with an Access Key credential type.
9696

9797
</details>
9898

0 commit comments

Comments
 (0)