Skip to content

Commit 8470c62

Browse files
committed
Formatting.
1 parent afe90c0 commit 8470c62

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

tutorials/s3_microsoft_entra_oidc.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -82,16 +82,17 @@ Assign a role to the identity provider created in the previous step with permiss
8282

8383
4. Enter the Role ARN from the previous step when prompted. It will be saved in the bookmark as a [custom property](hidden_properties.md#in-duck-bookmark-files).
8484

85+
:::{note}
86+
Alternatively set `role_arn` as a custom property in a [custom connection profile](../protocols/profiles/aws_oidc.md).
87+
:::
88+
8589
:::{image} _images/S3_Role_ARN_Prompt.png
8690
:alt: MFA Prompt
8791
:width: 400px
8892
:::
8993

90-
:::{note}
91-
Alternatively set `role_arn` as a custom property in a [custom connection profile](../protocols/profiles/aws_oidc.md).
92-
:::
93-
9494
:::{admonition} Troubleshooting
95+
:class: attention
9596
### `Not authorized to perform sts:AssumeRoleWithWebIdentity`
9697
Validate the _Trusted entities_ in _Trust relationships_ in the IAM console.
9798

@@ -103,4 +104,4 @@ Invalid client token ID. Check the OAuth Client ID in the connection profile.
103104
:::
104105

105106
## References
106-
- [OIDC federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html)
107+
- [AWS Identity and Access Management → OIDC federation](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_oidc.html)

0 commit comments

Comments
 (0)