Skip to content

Commit 9f1b2aa

Browse files
committed
docs: replace Leapp and aws-teams references with Atmos Auth
1 parent 03f001f commit 9f1b2aa

File tree

7 files changed

+7
-8
lines changed

7 files changed

+7
-8
lines changed

docs/layers/data/setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ In order to deploy Data layer components, Networking must be fully deployed and
2525
All deployment steps below assume that the environment has been successfully set up with the following steps.
2626

2727
<Steps>
28-
1. Sign into AWS via Leapp
28+
1. Sign into AWS via [Atmos Auth](/layers/identity/how-to-log-into-aws/)
2929
2. Connect to the VPN
3030
3. Open Geodesic
3131
</Steps>

docs/layers/ecs/deploy-clusters.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ In order to deploy ECS, Networking must be fully deployed and functional. In par
2626
All deployment steps below assume that the environment has been successfully set up with the following steps.
2727

2828
<Steps>
29-
1. Sign into AWS via Leapp
29+
1. Sign into AWS via [Atmos Auth](/layers/identity/how-to-log-into-aws/)
3030
1. Connect to the VPN
3131
1. Open Geodesic
3232
</Steps>

docs/layers/eks/deploy-clusters.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ must have a working VPN connection to the targeted account. See [the network doc
3333
All deployment steps below assume that the environment has been successfully set up with the following steps.
3434

3535
<Steps>
36-
1. Sign into AWS via Leapp
36+
1. Sign into AWS via [Atmos Auth](/layers/identity/how-to-log-into-aws/)
3737
1. Connect to the VPN
3838
1. Open Geodesic
3939
</Steps>

docs/layers/foundation.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ import ReactPlayer from 'react-player';
5252
<Step>
5353
## <StepNumber/> Rollout Identity & Authentication
5454

55-
Learn how Cloud Posse sets up fine-grained access control for an entire organization using IAM roles, AWS SAML, and AWS IAM Identity Center (SSO). It addresses the challenges of using various login methods and tools and introduces a solution involving Teams and Team Roles to manage access across multiple AWS accounts. This approach ensures precise control, easy role switching, and compatibility with different identity providers. Additionally, we provide a solution optimized for cross-account Terraform access, programmatic access for GitHub OIDC, and a user-friendly login experience with AWS Identity Center (AWS SSO), using tools like Leapp to facilitate seamless authentication and access management.
55+
Learn how Cloud Posse sets up fine-grained access control for an entire organization using Permission Sets, IAM roles, and AWS IAM Identity Center (SSO). It addresses the challenges of managing access across multiple AWS accounts with a solution that ensures precise control, easy role switching, and compatibility with different identity providers. This approach provides seamless authentication via Atmos Auth for CLI access, programmatic access for GitHub Actions via OIDC, and a user-friendly login experience with AWS Identity Center.
5656

5757
<figure>
5858
<ReactPlayer controls url="https://docs.cloudposse.com/assets/refarch/handoffs/identity-and-authentication.mp4" />

docs/layers/security-and-compliance/faq.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,4 +106,4 @@ console for the `root` account within the given Organization, go to Security Hub
106106
│ 42: resource "aws_config_config_rule" "rules" {│
107107
```
108108
109-
A: The `support` role may not be deployed into the given account. Check `aws-team-roles` for the `support` role.
109+
A: The `support` role may not be deployed into the given account. Check your IAM role configuration for the `support` role.

docs/layers/security-and-compliance/setup.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,7 @@ The following steps are required to set up Security and Compliance in your AWS O
118118
[CIS Benchmark 1.20](https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cis-controls.html#securityhub-cis-controls-1.20)
119119
and [IAM.18](https://docs.aws.amazon.com/securityhub/latest/userguide/iam-controls.html#iam-18).
120120

121-
These roles are managed from the [Identity Workflow](/layers/identity/deploy/)
122-
using `aws-teams` and `aws-team-roles` components.
121+
These roles are managed from the [Identity layer](/layers/identity/).
123122
</Step>
124123
</Steps>
125124

docs/layers/software-delivery/eks-argocd/setup.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ All deployment steps below assume that the environment has been successfully set
3030
### Authentication
3131

3232
<Steps>
33-
1. Sign into AWS via Leapp
33+
1. Sign into AWS via [Atmos Auth](/layers/identity/how-to-log-into-aws/)
3434
1. Connect to the VPN
3535
1. Open Geodesic
3636
</Steps>

0 commit comments

Comments
 (0)