Skip to content

Commit

Permalink
README reviews
Browse files Browse the repository at this point in the history
  • Loading branch information
rodrigobersa committed Aug 14, 2023
1 parent b679af6 commit acf7b20
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 8 deletions.
6 changes: 1 addition & 5 deletions examples/single-sign-on/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Single Sign-On for Amazon EKS Cluster

These examples demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with an external Identity Provider (IdP) for Single Sign-On (SSO) authentication. The authorization configuration still being done using Kubernetes Role-based access control (RBAC). By the this time we have integration with the following IdPs.
These examples demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with an external Identity Provider (IdP) for Single Sign-On (SSO) authentication. The authorization configuration still being done using Kubernetes Role-based access control (RBAC). At this time we have integration with the following IdPs.

- [IAM Identity Center (successor to AWS Single Sign-On)](https://aws.amazon.com/iam/identity-center/)
- [Okta](https://www.okta.com/)
Expand All @@ -19,11 +19,7 @@ To provision these examples, run the following commands:

```sh
terraform init
<<<<<<< HEAD
terraform apply -target module.vpc
=======
terraform apply -target module.vpc
>>>>>>> 411e9828 (Adding example)
terraform apply -target module.eks
terraform apply
```
Expand Down
4 changes: 2 additions & 2 deletions examples/single-sign-on/iam-identity-center/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# IAM Identity Center Single Sign-On for Amazon EKS Cluster

These example demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with IAM Identity Center (former AWS SSO) as an the Identity Provider (IdP) for Single Sign-On (SSO) authentication. The authorization configuration layer still being done using Kubernetes Role-based access control (RBAC). By the this time we have integration with the following IdPs.
This example demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with IAM Identity Center (former AWS SSO) as an the Identity Provider (IdP) for Single Sign-On (SSO) authentication. The configuration for authorization is done using Kubernetes Role-based access control (RBAC).

## Prerequisites:

Expand Down Expand Up @@ -32,7 +32,7 @@ Enter `yes` at command prompt to apply

After the `terraform` commands are executed sucessfully, check if the newly created users are active.

To do that use the link provided in the email invite if you added a valid email address for your users, or go to the [IAM Identity Center Console](https://console.aws.amazon.com/singlesignon/home/), in the *Users* dashboard on the left hand side menu, then select the user, and click on *Reset password* button on the upper right corner. Choose the option to *Generate a one-time password and share the password with the user*.
To do that use the link provided in the email invite - *if you added a valid email address for your users either in your Terraform code or IAM Identity Center Console* - or go to the [IAM Identity Center Console](https://console.aws.amazon.com/singlesignon/home/), in the *Users* dashboard on the left hand side menu, then select the user, and click on *Reset password* button on the upper right corner. Choose the option to *Generate a one-time password and share the password with the user*.

With the active users, use one of the `terraform output` examples to configure your AWS credentials for SSO, as shown in the examples below. After you choose the *SSO registration scopes*, your browser windows will appear and request to login using your IAM Identity Center username and password.

Expand Down
2 changes: 1 addition & 1 deletion examples/single-sign-on/okta/README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# Okta Single Sign-On for Amazon EKS Cluster

These example demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with Okta as an the Identity Provider (IdP) for Single Sign-On (SSO) authentication. The authorization configuration layer still being done using Kubernetes Role-based access control (RBAC). By the this time we have integration with the following IdPs.
This example demonstrates how to deploy an Amazon EKS cluster that is deployed on the AWS Cloud, integrated with Okta as an the Identity Provider (IdP) for Single Sign-On (SSO) authentication. The configuration for authorization is done using Kubernetes Role-based access control (RBAC).

## Prerequisites:

Expand Down

0 comments on commit acf7b20

Please sign in to comment.