Skip to content

Commit 91c28c2

Browse files
committed
reduce "Amplify Auth" mentions
1 parent a4d22ad commit 91c28c2

File tree

1 file changed

+4
-4
lines changed
  • src/pages/[platform]/build-a-backend/auth/examples/microsoft-entra-id-saml

1 file changed

+4
-4
lines changed

src/pages/[platform]/build-a-backend/auth/examples/microsoft-entra-id-saml/index.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Microsoft Entra ID can be configured as a SAML provider for use with Amazon Cogn
3232

3333
## Start your personal cloud sandbox
3434

35-
To get started, define your Amplify Auth resource with the appropriate redirect URIs:
35+
To get started, define your auth resource with the appropriate redirect URIs:
3636

3737
```ts title="amplify/auth/resource.ts"
3838
import { defineAuth } from "@aws-amplify/backend"
@@ -155,9 +155,9 @@ Save the configuration and proceed to Step 3's **SAML Certificates** section. Co
155155

156156
![Entra ID set up single sign-on page highlighting the app federation metadata URL](/images/auth/examples/microsoft-entra-id-saml/entra-id-copy-federation-url.png)
157157

158-
## Configure Amplify Auth with Entra ID
158+
## Configure your backend with Entra ID
159159

160-
Now that you've configured your SAML provider with Microsoft Entra ID and copied the **App Federation Metadata Url**, configure your Amplify Auth resource with the new SAML provider and paste the URL value into the `metadataContent` property:
160+
Now that you've configured your SAML provider with Microsoft Entra ID and copied the **App Federation Metadata Url**, configure your auth resource with the new SAML provider and paste the URL value into the `metadataContent` property:
161161

162162
```ts title="amplify/auth/resource.ts"
163163
import { defineAuth } from "@aws-amplify/backend"
@@ -207,7 +207,7 @@ Save your changes, and now requests to Entra ID from your Cognito User Pool will
207207

208208
## Connect your frontend
209209

210-
Now your users are ready to sign in with Microsoft Entra ID. To sign in with this custom provider, specify the provider name as the name specified in your Amplify Auth definition: `MicrosoftEntraIDSAML`
210+
Now your users are ready to sign in with Microsoft Entra ID. To sign in with this custom provider, specify the provider name as the name specified in your auth resource definition: `MicrosoftEntraIDSAML`
211211

212212
<InlineFilter filters={["angular", "javascript", "nextjs", "react", "react-native", "vue"]}>
213213

0 commit comments

Comments
 (0)