Skip to content

Commit

Permalink
Apply suggested changes from code review
Browse files Browse the repository at this point in the history
Add a few changes suggested by @galund following code review. Improve a few image alt texts; remove a duplicated line referring to removing users; and fix some spellings introduced in the last commit.

Co-authored-by: George Lund <[email protected]>
  • Loading branch information
stephengrier and galund authored Feb 21, 2024
1 parent 1f1458f commit 7b5132e
Showing 1 changed file with 4 additions and 6 deletions.
10 changes: 4 additions & 6 deletions source/manuals/working-with-aws-accounts.html.md.erb
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ review_in: 12 months

Most teams in GDS use [Amazon Web Services (AWS)](https://aws.amazon.com/) as their infrastructure provider. GDS teams in GOV.UK and DSP manage their own AWS accounts, but users must first sign into a shared base AWS account called `gds-users`. They can then assume roles in their team's AWS account to perform administrative tasks using [AWS's cross-account access pattern](https://docs.aws.amazon.com/IAM/latest/UserGuide/tutorial_cross-account-with-roles.html).

Note GOV.UK One Login has its own AWS organisation separate from GDS / Cabinet Office accounts. That is managed by the program and separate guidance applies.
Note that GOV.UK One Login has its own AWS Organization separate from GDS / Cabinet Office accounts. That is managed by the programme, and separate guidance applies.

## Request AWS user access

Expand Down Expand Up @@ -111,21 +111,21 @@ Once setup is complete users can access AWS using the AWS Console or the command
<a href="https://gds-users.signin.aws.amazon.com/console">https://gds-users.signin.aws.amazon.com/console</a>
<details>
<summary><small>Screenshot of the sign in page</small></summary>
<img src="/images/working-with-aws-accounts/aws-base-account-signin-form.png" alt="Screenshot of the sign in page">
<img src="/images/working-with-aws-accounts/aws-base-account-signin-form.png" alt="Screenshot showing AWS Sign-in screen. The 'Account ID or alias' box is filled out with 'gds-users'. 'IAM user name' and 'password' boxes are ready to fill out.">
</details>
</li>
<li>
From the top right dropdown menu, select **Switch Role**
<details>
<summary><small>Screenshot of the switch role menu item</small></summary>
<img src="/images/working-with-aws-accounts/aws-switch-role-menu.png" alt="Screenshot of the sign in page">
<img src="/images/working-with-aws-accounts/aws-switch-role-menu.png" alt="Screenshot of the switch role menu, with 'Switch Role' appearing underneath the 'My Security Credentials' menu item.">
</details>
</li>
<li>
Complete **Account** with account or <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/console_account-alias.html#AboutAccountAlias">account alias</a> and the role you're switching to
<details>
<summary><small>Screenshot of the switch role page</small></summary>
<img src="/images/working-with-aws-accounts/aws-switch-role-form.png" alt="Screenshot of the sign in page">
<img src="/images/working-with-aws-accounts/aws-switch-role-form.png" alt="Screenshot of the switch role page with 'Account', 'Role' and 'Display name' boxes ready to fill out.">
</details>
</li>
</ul>
Expand Down Expand Up @@ -333,8 +333,6 @@ and ideally conform to the following (except for extenuating circumstances):

When your team no longer requires an AWS account, contact Reliability Engineering using the [#Reliability-eng Slack Channel](https://gds.slack.com/messages/CAD6NP598/convo/CAD6NP598-1540294660.000100/).

GDS teams are responsible for managing their own leavers’ process.

## Remove access to AWS accounts

When someone no longer requires access to AWS (for example, because they've left GDS or your team) remove them from the `gds-users` base account using the **Request user removal** section of the:
Expand Down

0 comments on commit 7b5132e

Please sign in to comment.