Skip to content

Commit 98a9941

Browse files
authored
Merge pull request #261605 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents 7870bdb + e3e88a4 commit 98a9941

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/defender-for-cloud/concept-aws-connector.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -37,15 +37,14 @@ The architecture of the authentication process across clouds is as follows:
3737

3838
1. The Microsoft Entra token is exchanged with AWS short living credentials and Defender for Cloud's CSPM service assumes the CSPM IAM role (assumed with web identity).
3939

40-
1. Since the principle of the role is a federated identity as defined in a trust relationship policy, the AWS identity provider validates the Microsoft Entra token against the Microsoft Entra ID through a process that includes:
41-
40+
1. Since the principal of the role is a federated identity as defined in a trust relationship policy, the AWS identity provider validates the Microsoft Entra token against the Microsoft Entra ID through a process that includes:
4241
- audience validation
43-
- signing of the token
42+
- token digital signature validation
4443
- certificate thumbprint
4544

4645
1. The Microsoft Defender for Cloud CSPM role is assumed only after the validation conditions defined at the trust relationship have been met. The conditions defined for the role level are used for validation within AWS and allows only the Microsoft Defender for Cloud CSPM application (validated audience) access to the specific role (and not any other Microsoft token).
4746

48-
1. After the Microsoft Entra token validated by the AWS identity provider, the AWS STS exchanges the token with AWS short-living credentials which CSPM service uses to scan the AWS account.
47+
1. After the Microsoft Entra token is validated by the AWS identity provider, the AWS STS exchanges the token with AWS short-living credentials which the CSPM service uses to scan the AWS account.
4948

5049
## Native connector plan requirements
5150

@@ -127,3 +126,4 @@ You can check out the following blogs:
127126
Connecting your AWS account is part of the multicloud experience available in Microsoft Defender for Cloud.
128127

129128
- [Protect all of your resources with Defender for Cloud](enable-all-plans.md)
129+

0 commit comments

Comments
 (0)