You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/layers/ecs/tutorials/1password-scim-bridge.mdx
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -29,14 +29,14 @@ The implementation of this is fairly simple. We will generate credentials for th
29
29
1. Click Integrations in the sidebar
30
30
1. Select "Set up user provisioning"
31
31
1. Choose "Custom"
32
-
1. You should now see the SCIM bridge credentials. We will need the "Bearer Token" for the next steps.
33
-
1. Save this token in a secure location (such as 1Password) for future reference
34
-
1. Store the credentials in AWS SSM Parameter Store. This will allow the ECS task definition to access the credentials securely.
32
+
1. You should now see the SCIM bridge credentials. We will need the "scimsession" and "Bearer Token" for the next steps.
33
+
1. Save these credentials in a secure location (such as 1Password) for future reference
34
+
1. Store only the "scimsession" in AWS SSM Parameter Store. This will allow the ECS task definition to access the credentials securely. Then once the service is running, the server will ask for the bearer token to verify the connection, which we will enter at that time.
35
35
36
36
<Steps>
37
37
- Open the AWS Web Console - Navigate to the target account, such as `core-auto`, and target region, such as `us-west-2`
38
38
- Open "AWS System Manager" > "Parameter Store"
39
-
- Create a new Secure String parameter using the credentials you generated in the previous step: `/1password/scim/bearer-token`
39
+
- Create a new Secure String parameter using the credentials you generated in the previous step: `/1password/scim/scimsession`
40
40
</Steps>
41
41
</Steps>
42
42
@@ -87,7 +87,7 @@ The implementation of this is fairly simple. We will generate credentials for th
87
87
OP_TLS_DOMAIN: ""
88
88
OP_CONFIRMATION_INTERVAL: "300"
89
89
map_secrets:
90
-
OP_SESSION: "1password/scim/bearer-token"
90
+
OP_SESSION: "1password/scim/scimsession"
91
91
# OP_WORKSPACE_CREDENTIALS: ""
92
92
# OP_WORKSPACE_SETTINGS: ""
93
93
log_configuration:
@@ -122,15 +122,15 @@ The implementation of this is fairly simple. We will generate credentials for th
122
122
<Step>
123
123
### <StepNumber/> Validate the Integration
124
124
125
-
The final step is to validate the integration. Connect to the VPN (if deployed the ECS service is deployed with a private ALB), navigate to the SCIM bridge URL, and confirm the service is running.
125
+
After deploying the SCIM bridge ECS service, verify the service is running and accessible. Connect to the VPN (if deployed the ECS service is deployed with a private ALB), navigate to the SCIM bridge URL, and confirm the service is running.
126
126
127
127
For example, go to `https://1pass-scim.platform.usw1.auto.core.acme-svc.com/`
128
128
</Step>
129
129
130
130
<Step>
131
-
### <StepNumber/> Connect your Identity Provider
131
+
### <StepNumber/> Connect your Identity Provider
132
132
133
-
Finally, connect your identity provider to the SCIM bridge. The SCIM bridge URL will be the URL you validated in the previous step. Follow the instructions in the 1Password SCIM Bridge documentation to connect your identity provider.
133
+
Finally, connect your identity provider to the SCIM bridge. The SCIM bridge URL will be the URL you validated in the previous step. Follow the instructions in the 1Password SCIM Bridge documentation to connect your identity provider, using the Bearer Token you generated in the first step.
0 commit comments