diff --git a/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx b/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx index d8771aadaa6..72707ec589e 100644 --- a/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx +++ b/product_docs/docs/biganimal/release/getting_started/identity_provider/aws_sso.mdx @@ -35,28 +35,18 @@ description: "Using AWS SSO as your identity provider for your Azure account" 1. Select **Save changes** at the bottom of the AWS page. 1. Go to your newly-created application (appearing under its display name) and select the **Attribute mappings** tab. -1. Add your desired attributes: - 1. Enter BigAnimal attributes under **User attribute in the application**. - - | Attributes in BigAnimal | - | -------------------------------------------------------------------- | - | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname | - | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname | - | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name | - | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameidentifier | - | http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | - - 2. Enter the corresponding AWS SSO attributes under **Maps to this string value or user attribute in AWS SSO**. - - | Supported AWS SSO attributes | - | ---------------------------- | - | ${user:givenName} | - | ${user:familyName} | - | ${user:name} | - | ${user:preferredUsername} | - | ${user:email} | - - 3. Choose an appropriate **Format** for each attribute (for example: emailAddress). +1. Enter your desired attribute configuration. We reccomend the following: + + | User attribute in the application | Maps to this string value or user attribute in AWS SSO | Format | + | --------------------------------- | ------------------------------------------------------ | ------------ | + | Subject | ${user:email} | emailAddress | + | /givenname | ${user:givenName} | basic | + | /surname | ${user:familyName} | basic | + | /name | ${user:preferredUsername} | basic | + | /nameidentifier | ${user:name} | basic | + | /emailaddress | ${user:email} | basic | + + Where is http://schemas.xmlsoap.org/ws/2005/05/identity/claims. 1. Go to the **Assigned users** tab and select the **Assign users** button to allow users access to the application. 1. Go to the **Configuration** tab and scroll down to the **AWS SSO metadata** section. 1. Copy the **AWS SSO sign-in URL**.