Skip to content

Commit ee7085a

Browse files
Update aws-single-sign-on-provisioning-tutorial.md
1 parent 8ad5b7b commit ee7085a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/active-directory/saas-apps/aws-single-sign-on-provisioning-tutorial.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ This section guides you through the steps to configure the Azure AD provisioning
103103

104104
8. Under the **Mappings** section, select **Synchronize Azure Active Directory Users to AWS IAM Identity Center**.
105105

106-
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you will need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
106+
9. Review the user attributes that are synchronized from Azure AD to AWS IAM Identity Center in the **Attribute-Mapping** section. The attributes selected as **Matching** properties are used to match the user accounts in AWS IAM Identity Center for update operations. If you choose to change the [matching target attribute](../app-provisioning/customize-application-attributes.md), you'll need to ensure that the AWS IAM Identity Center API supports filtering users based on that attribute. Select the **Save** button to commit any changes.
107107

108108
|Attribute|Type|Supported for Filtering|
109109
|---|---|---|
@@ -164,10 +164,10 @@ Once you've configured provisioning, use the following resources to monitor your
164164

165165
1. Use the [provisioning logs](../reports-monitoring/concept-provisioning-logs.md) to determine which users have been provisioned successfully or unsuccessfully
166166
2. Check the [progress bar](../app-provisioning/application-provisioning-when-will-provisioning-finish-specific-user.md) to see the status of the provisioning cycle and how close it is to completion
167-
3. If the provisioning configuration seems to be in an unhealthy state, the application will go into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
167+
3. If the provisioning configuration seems to be in an unhealthy state, the application goes into quarantine. Learn more about quarantine states [here](../app-provisioning/application-provisioning-quarantine-status.md).
168168

169169
## Just-in-time (JIT) application access with PIM for groups (preview)
170-
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to priviliged groups in AWS.
170+
With PIM for Groups, you can provide just-in-time access to groups in Amazon Web Services and reduce the number of users that have permanent access to privileged groups in AWS.
171171

172172
**Configure your enterprise application for SSO and provisioning**
173173
1. Add AWS IAM Identity Center to your tenant, configure it for provisioning as described in the tutorial above, and start provisioning.
@@ -192,7 +192,7 @@ Now any end user that was made eligible for the group in PIM can get JIT access
192192
## Troubleshooting Tips
193193

194194
### Missing attributes
195-
When exporting a user to AWS, they are required to have the following attributes
195+
When provisioning a user to AWS, they're required to have the following attributes
196196

197197
* firstName
198198
* lastName
@@ -205,7 +205,7 @@ Users who don't have these attributes will fail with the following error
205205

206206

207207
### Multi-valued attributes
208-
AWS does not support the following multi-valued attributes:
208+
AWS doesn't support the following multi-valued attributes:
209209

210210
* email
211211
* phone numbers

0 commit comments

Comments
 (0)