Skip to content

Commit a35f434

Browse files
authored
Fix: 1Pass SCIM Bridge Instructions (#700)
1 parent 71e8b98 commit a35f434

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

docs/layers/ecs/tutorials/1password-scim-bridge.mdx

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ The implementation of this is fairly simple. We will generate credentials for th
2929
1. Click Integrations in the sidebar
3030
1. Select "Set up user provisioning"
3131
1. Choose "Custom"
32-
1. You should now see the SCIM bridge credentials. We will need the "Bearer Token" for the next steps.
33-
1. Save this token in a secure location (such as 1Password) for future reference
34-
1. Store the credentials in AWS SSM Parameter Store. This will allow the ECS task definition to access the credentials securely.
32+
1. You should now see the SCIM bridge credentials. We will need the "scimsession" and "Bearer Token" for the next steps.
33+
1. Save these credentials in a secure location (such as 1Password) for future reference
34+
1. Store only the "scimsession" in AWS SSM Parameter Store. This will allow the ECS task definition to access the credentials securely. Then once the service is running, the server will ask for the bearer token to verify the connection, which we will enter at that time.
3535

3636
<Steps>
3737
- Open the AWS Web Console - Navigate to the target account, such as `core-auto`, and target region, such as `us-west-2`
3838
- Open "AWS System Manager" > "Parameter Store"
39-
- Create a new Secure String parameter using the credentials you generated in the previous step: `/1password/scim/bearer-token`
39+
- Create a new Secure String parameter using the credentials you generated in the previous step: `/1password/scim/scimsession`
4040
</Steps>
4141
</Steps>
4242

@@ -87,7 +87,7 @@ The implementation of this is fairly simple. We will generate credentials for th
8787
OP_TLS_DOMAIN: ""
8888
OP_CONFIRMATION_INTERVAL: "300"
8989
map_secrets:
90-
OP_SESSION: "1password/scim/bearer-token"
90+
OP_SESSION: "1password/scim/scimsession"
9191
# OP_WORKSPACE_CREDENTIALS: ""
9292
# OP_WORKSPACE_SETTINGS: ""
9393
log_configuration:
@@ -122,15 +122,15 @@ The implementation of this is fairly simple. We will generate credentials for th
122122
<Step>
123123
### <StepNumber/> Validate the Integration
124124

125-
The final step is to validate the integration. Connect to the VPN (if deployed the ECS service is deployed with a private ALB), navigate to the SCIM bridge URL, and confirm the service is running.
125+
After deploying the SCIM bridge ECS service, verify the service is running and accessible. Connect to the VPN (if deployed the ECS service is deployed with a private ALB), navigate to the SCIM bridge URL, and confirm the service is running.
126126

127127
For example, go to `https://1pass-scim.platform.usw1.auto.core.acme-svc.com/`
128128
</Step>
129129

130130
<Step>
131-
### <StepNumber/> Connect your Identity Provider
131+
### <StepNumber/> Connect your Identity Provider
132132

133-
Finally, connect your identity provider to the SCIM bridge. The SCIM bridge URL will be the URL you validated in the previous step. Follow the instructions in the 1Password SCIM Bridge documentation to connect your identity provider.
133+
Finally, connect your identity provider to the SCIM bridge. The SCIM bridge URL will be the URL you validated in the previous step. Follow the instructions in the 1Password SCIM Bridge documentation to connect your identity provider, using the Bearer Token you generated in the first step.
134134

135135
</Step>
136136

0 commit comments

Comments
 (0)