Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: ECS 1Password SCIM Bridge Guide #664

Merged
merged 12 commits into from
Sep 16, 2024
Prev Previous commit
Next Next commit
Add CollapsibleText component for configuration details
milldr committed Aug 20, 2024
commit 4393d5a0ef155d277cefa0bbaa4842e7cddce8d1
24 changes: 12 additions & 12 deletions docs/layers/ecs/tutorials/1password-scim-bridge.mdx
Original file line number Diff line number Diff line change
@@ -8,6 +8,7 @@ import Intro from "@site/src/components/Intro";
import Steps from "@site/src/components/Steps";
import Step from "@site/src/components/Step";
import StepNumber from "@site/src/components/StepNumber";
import CollapsibleText from "@site/src/components/CollapsibleText";

<Intro>
The 1Password SCIM Bridge is a service that allows you to automate the management of users and groups in 1Password. This guide will walk you through deploying the SCIM Bridge for ECS environments.
@@ -30,16 +31,16 @@ The implementation of this is fairly simple. We will generate credentials for th
1. Follow the onscreen instructions to generate credentials for your SCIM bridge.
1. Store the credentials in AWS SSM Parameter Store.

<Steps>
- Open the AWS Web Console - Navigate to the target account, such as `plat-dev`, and target region, such as `us-west-2`
- Open "AWS System Manager" > "Parameter Store"
- Create 2 new Secure String parameters using the credentials you generated in the previous step:
<Steps>
- Open the AWS Web Console - Navigate to the target account, such as `plat-dev`, and target region, such as `us-west-2`
- Open "AWS System Manager" > "Parameter Store"
- Create 2 new Secure String parameters using the credentials you generated in the previous step:

```console
SCIM_USERNAME: "/1password/scim-bridge/username"
SCIM_PASSWORD: "/1password/scim-bridge/password"
```
</Steps>
```console
SCIM_USERNAME: "/1password/scim-bridge/username"
SCIM_PASSWORD: "/1password/scim-bridge/password"
```
</Steps>
</Steps>

</Step>
@@ -54,8 +55,7 @@ The implementation of this is fairly simple. We will generate credentials for th
<Steps>
1. Create a new stack configuration for the SCIM bridge. The placement of this file will depend on your project structure. For example, you could create a new file such as `stacks/catalog/ecs-services/1password-scim-bridge.yaml` with the following content:

<details>
<summary>`1pass-scim` Stack Component Configuration</summary>
<CollapsibleText type="medium">
```yaml
import:
- catalog/terraform/services/defaults
@@ -112,7 +112,7 @@ The implementation of this is fairly simple. We will generate credentials for th
logDriver: awslogs
options: {}
```
</details>
</CollapsibleText>
2. Confirm the `map_secrets` for `OP_WORKSPACE_CREDENTIALS` and `OP_WORKSPACE_SETTINGS` match the AWS SSM Parameter Store paths you created previously, and confirm they are in the same account and region as this ECS service component.
3. Deploy the ECS service with Atmos:
```bash