Skip to content
This repository was archived by the owner on Jan 14, 2025. It is now read-only.

Commit 82b0421

Browse files
authored
Merge pull request #170 from justonian/master
Merging in Auth workshop readme refinements
2 parents 142cd9b + 3e3e2dc commit 82b0421

File tree

4 files changed

+11
-1
lines changed

4 files changed

+11
-1
lines changed

Auth/0_GettingStarted/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ This section outlines the prerequisites to complete the workshop and instruction
66

77
### AWS Account
88

9-
In order to complete this workshop, you'll need an AWS account and access to create and manage the AWS resources that are used in this workshop, including Cloud9, Cognito, API Gateway, Lambda, DynamoDB, and IAM policies and roles.
9+
In order to complete this workshop, you'll need an AWS account and access to create and manage the AWS resources that are used in this workshop, including Cloud9, Cognito, API Gateway, Lambda, DynamoDB, and IAM policies and roles. *The IAM user/role used for this workshop will require administrative and IAM full access permissions*.
1010

1111
The code and instructions in this workshop assume only one participant is using a given AWS account at a time. If you attempt sharing an account with another participant, you may encounter naming conflicts for certain resources. You can work around this by using distinct Regions, but the instructions do not provide details on the changes required to make this work.
1212

Auth/9_CleanUp/README.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,16 @@
4747
```
4848
aws cognito-idp list-user-pools --max-results 10
4949
```
50+
51+
#### Detach CognitoIdentityPoolAuthStandardPolicy IAM Policy
52+
53+
1. Before you delete the backend stack, you will need to remove the IAM Policy that you manually attached to the **Auth** role.
54+
55+
Navigate to the Identity and Access Management (IAM) Console and search for the **Auth** role and click into it.
56+
57+
![Find Auth Role](../images/iam-cleanup-findAuthRole.png)
58+
59+
2. On the Role Summary page, find the policy named **WildRydesAPI-StandardUserPolicy** in the Permissions tab. Once you locate the policy, click the **X** to remove this policy from the IAM Role. A popup window will ask you to confirm that you want to remove it - click the red **Detach** button.
5060

5161
#### Remove WildRydes Backend
5262

219 KB
Loading
151 KB
Loading

0 commit comments

Comments
 (0)