You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/aws-single-sign-on-provisioning-tutorial.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ This section guides you through the steps to configure the Azure AD provisioning
103
103
104
104
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to AWS IAM Identity Center**.
105
105
106
-
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
106
+
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
107
107
108
108
|Attribute|Type|Supported for Filtering|
109
109
|---|---|---|
@@ -164,10 +164,10 @@ Once you've configured provisioning, use the following resources to monitor your
164
164
165
165
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
166
166
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
167
-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167
+
3. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
168
168
169
169
## Just-in-time (JIT) application access with PIM for groups (preview)
170
-
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to priviliged groups in AWS.
170
+
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to privileged groups in AWS.
171
171
172
172
**Configure your enterprise application for SSO and provisioning**
173
173
1. Add AWS IAM Identity Center to your tenant, configure it for provisioning as described in the tutorial above, and start provisioning.
@@ -192,7 +192,7 @@ Now any end user that was made eligible for the group in PIM can get JIT access
192
192
## Troubleshooting Tips
193
193
194
194
### Missing attributes
195
-
When exporting a user to AWS, they are required to have the following attributes
195
+
When provisioning a user to AWS, they're required to have the following attributes
196
196
197
197
* firstName
198
198
* lastName
@@ -205,7 +205,7 @@ Users who don't have these attributes will fail with the following error
205
205
206
206
207
207
### Multi-valued attributes
208
-
AWS does not support the following multi-valued attributes:
208
+
AWS doesn't support the following multi-valued attributes:
0 commit comments