You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/pages/[platform]/start/account-setup/index.mdx
+20-24Lines changed: 20 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,8 @@ import { getCustomStaticPath } from '@/utils/getCustomStaticPath';
2
2
3
3
exportconst meta = {
4
4
title: 'Configure AWS for local development',
5
-
description: 'Learn how to set up your AWS account and configure it locally for use with Amplify.',
5
+
description:
6
+
'Learn how to set up your AWS account and configure it locally for use with Amplify.',
6
7
platforms: [
7
8
'android',
8
9
'angular',
@@ -35,9 +36,9 @@ export function getStaticProps(context) {
35
36
36
37
</Callout>
37
38
38
-
This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html)and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows.
39
+
This guide will help you set up Temporary credentials with [IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html) and [AWS Organizations](https://docs.aws.amazon.com/organizations/latest/userguide/orgs_introduction.html), which will enable you to define Single-sign on (SSO), users, groups, permission sets, and more for your team. AWS Organizations can grow to house multiple AWS accounts. Users within the organization can traverse the AWS account(s) as their permission set allows.
39
40
40
-
Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys).
41
+
Amplify leverages the standard local credentials chain provider to simplify access to AWS services. While this guide highlights IAM Identity Center, you can explore additional methods for [authenticating with AWS locally](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-quickstart.html#getting-started-prereqs-keys).
41
42
42
43
<Accordiontitle="IAM Identity Center terminology">
43
44
@@ -46,7 +47,6 @@ IAM Identity Center enables users to sign in using a single user identity to acc
46
47
### Users
47
48
48
49
Users refers to the location where user identities and group information are stored and managed. IAM Identity Center can integrate with external identity sources like Microsoft Active Directory or use a built-in identity store provided by AWS.
49
-
50
50
51
51
### Permission Set
52
52
@@ -71,7 +71,6 @@ You can use temporary security credentials to make programmatic requests for AWS
71
71
72
72
</Accordion>
73
73
74
-
75
74
## Set up Identity Center
76
75
77
76
Follow the steps below if **you have never set up AWS profiles before**. If you already have a profile, attach the `AmplifyBackendDeployFullAccess` managed policy to your [IAM user](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups_manage_attach-policy.html).
@@ -80,21 +79,22 @@ Follow the steps below if **you have never set up AWS profiles before**. If you
80
79
81
80
Sign in to the AWS Console to access [IAM Identity Center page](https://console.aws.amazon.com/singlesignon/home) and choose **Enable**.
82
81
83
-

82
+

84
83
85
84
A dialog will open, prompting you to "Choose how to configure IAM Identity Center in your AWS environment." Select **Enable with AWS Organizations** and choose **Continue**.
86
85
87
-

86
+

88
87
89
88
Next, we are going to automate a number of steps that simulate the operations of setting up a user in the IdC console. To get started open CloudShell, located in the console footer.
read -p "Enter email address: " user_email # hit enter
97
96
```
97
+
98
98
```console showLineNumbers={false}
99
99
Enter email address: <your-email-address>
100
100
```
@@ -135,8 +135,7 @@ Username: amplify-admin
135
135

136
136
137
137
- Select **Create permission set**.
138
-
- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**.
139
-
Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**.
138
+
- When prompted for the permission set type, choose **Custom permission set**. Then choose **Next**. Expand **AWS Managed Policies (set)** and search for _amplify_. Select **AmplifyBackendDeployFullAccess** and choose **Next**.
140
139
141
140

142
141
@@ -157,7 +156,7 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify
157
156

158
157
159
158
- When prompted to assign a user or group, select the **Users** tab, select the user created in step 13, and choose **Next**.
160
-
159
+
161
160

162
161
163
162
- Assign the permission set created in step 9 and choose **Next**.
@@ -169,11 +168,12 @@ Expand **AWS Managed Policies (set)** and search for _amplify_. Select **Amplify
169
168
- Navigate to the copied URL and sign in as your user, _amplify-admin_. After signing in, you should have access to an AWS account.
170
169
171
170

171
+
172
172
</Accordion>
173
173
174
174
### 2. Create password for user
175
175
176
-
Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_.
176
+
Now create a password for the user that we need for the next step. In the IdC console, navigate to _Users > amplify_admin > Reset password > Send an email to the user with instructions for resetting the password_.
@@ -189,11 +189,10 @@ Now, set up an AWS profile that is linked to the user you just created on your l
189
189
190
190
Install the [AWS CLI](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html).
191
191
192
-
193
192
<BlockSwitcher>
194
193
195
194
<Blockname="Mac">
196
-
In your browser, download the macOS pkg file:
195
+
In your browser, download the macOS pkg file:
197
196
198
197
[Install on Mac](https://awscli.amazonaws.com/AWSCLIV2.pkg)
199
198
@@ -221,7 +220,7 @@ unzip awscliv2.zip
221
220
222
221
### 4. Set up local AWS profile
223
222
224
-
Open your terminal, you are ready to configure an AWS profile that uses the SSO user. Use the information from CloudShell to populate the information below.
223
+
Open your terminal, you are ready to configure an AWS profile that uses the SSO user. Use the information from CloudShell to populate the information below.
| Attempting to automatically open the SSO authorization page in your default browser.
235
234
| If the browser does not open or you wish to use a different device to authorize this request, open the following URL:
236
-
|
235
+
|
237
236
| https://device.sso.us-east-2.amazonaws.com/
238
-
|
237
+
|
239
238
| Then enter the code:
240
-
|
239
+
|
241
240
| SOME-CODE
242
241
243
242
## browser opens
@@ -279,17 +278,15 @@ sso_region = <your-region>
279
278
sso_registration_scopes = sso:account:access
280
279
```
281
280
282
-
283
281
### 5. Bootstrap your AWS account
284
282
285
-
Now you are ready to use this AWS profile with AWS Amplify. Open your Amplify project and start the sandbox. If you have multiple local profiles or named your profile something other than `default`, you can specify a profile with `--profile`.
286
-
283
+
Now you are ready to use this AWS profile with AWS Amplify. Open your Amplify project and start the sandbox. If you have multiple local profiles or named your profile something other than `default`, you can specify a profile with `--profile`.
287
284
288
285
```bash title="Terminal" showLineNumbers={false}
289
286
// highlight-next-line
290
287
npx ampx sandbox
291
288
292
-
# OR
289
+
# OR
293
290
294
291
// highlight-next-line
295
292
npx ampx sandbox --profile <profile-name>
@@ -306,8 +303,7 @@ Bootstrapping is the process of provisioning resources for the AWS CDK before yo
306
303
307
304

308
305
309
-
During the first-time setup, `npx ampx sandbox` will ask you to sign in to the AWS Management Console. Once you're signed in, you will be redirected to the Amplify console. On the **Create new app** page, choose **Initialize setup now**. It may take a few minutes for the bootstrapping process to complete.
310
-
306
+
During the first-time setup, `npx ampx sandbox` will ask you to sign in to the AWS Management Console. You must sign in as the account root user or as a user that has AdministratorAccess. Once signed in, you will be redirected to the Amplify console. On the **Create new app** page, choose **Initialize setup now**. It may take a few minutes for the bootstrapping process to complete.
311
307
312
308

0 commit comments