Skip to content

Commit 34c97b1

Browse files
[MCN] Refined steps (#20574)
* refined steps * refined steps
1 parent 023635e commit 34c97b1

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

src/content/docs/magic-cloud-networking/get-started.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -58,13 +58,13 @@ Once Cloudflare has the credentials required to access your cloud environments,
5858

5959
1. Create a [custom access policy](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_create-console.html) in your AWS account, and take note of the name you entered.
6060
2. Create an [AWS role](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-custom.html) with the following settings:
61-
1. **Trusted entity type**: Select **Custom trust policy**, and paste the custom trust policy returned by the Cloudflare dashboard.
62-
2. **Permissions**: Add the IAM policy created in step 1, along with these AWS-managed policies:
61+
- **Trusted entity type**: Select **Custom trust policy**, and paste the custom trust policy returned by the Cloudflare dashboard.
62+
- **Permissions**: Add the IAM policy created in step 1, along with these AWS-managed policies:
6363
- `NetworkAdministrator`
6464
- `AmazonEC2ReadOnlyAccess`
6565
- `AmazonVPCReadOnlyAccess`
6666
- `IAMReadOnlyAccess`
67-
3. **ARN**: Copy the ARN for your newly created user.
67+
- **ARN**: Copy the ARN for your newly created user.
6868

6969
:::note
7070
The trust policy may take several minutes to propagate to all regions. It usually takes less than four minutes, but can sometimes take longer. You may have to retry the **Authorize** button while the propagation takes effect.
@@ -93,8 +93,8 @@ The first discovery of resources may not succeed in all regions, while the IAM p
9393
2. Enter your Azure credentials. If your account does not have administrator privileges, you may need to pass this link to an account that has administrator privileges.
9494
3. The next screen lists Cloudflare required permissions to access your account. Select **Accept**.
9595
4. [Add a role assignment](https://learn.microsoft.com/en-us/azure/role-based-access-control/role-assignments-portal). The purpose of this step is to give the app that you registered in step 1 permission to access your Azure Subscription.
96-
1. In step 3 of the linked document, select the **Contributor** role from the **Privileged administrator roles** tab.
97-
2. In step 4 of the linked document, search for `mcn-provider-integrations-bot-prod` when selecting members.
96+
- In step 3 of the linked document, select the **Contributor** role from the **Privileged administrator roles** tab.
97+
- In step 4 of the linked document, search for `mcn-provider-integrations-bot-prod` when selecting members.
9898
5. In **Provide account information**, enter the **Tenant ID** and **Subscription ID** you copied from step 4.
9999
6. In **Verify account ownership**, [add the tags displayed in the Cloudflare dashboard](https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/tag-resources-portal).
100100

0 commit comments

Comments
 (0)