-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs(installation): update based on following documentation #9
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Notes on PR
## 4.5 Deploy Managed Active Directory configuration instance | ||
When using Managed Active Directory, manual steps are needed to customize the security group created for your domain controllers. By default traffic is only allowed from the CIDR range of the VPC where the directory is deployed. Traffic needs to be allowed from the Endpoint VPC where Amazon Route 53 Outbound Resolver endpoints are deployed as well as all other CIDRs associated to your VPC, other peered VPCs, or networks that you have connected using AWS Direct Connect, AWS Transit Gateway, or Virtual Private Network that need to communicate with the domain controllers. | ||
|
||
1. Locate the security group created by Directory Service in your Operations account (named `d-<your-directory-id>_controllers`) and edit the source of the inbound rules to allow traffic from the needed CIDR ranges. You can use the same value used for the `AcceleratorIpamSupernet` replacement variable that covers all your VPC address space. This needs to be customized according to your needs. | ||
|
||
Refer to the [AWS Directory Service documentation](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_getting_started.html#ms_ad_getting_started_what_gets_created) for more details. | ||
|
||
2. Edit the `iam-config.yaml` file to un-comment and edit as needed the `activeDirectoryConfigurationInstance` block under `managedActiveDirectories`. Send your configuration changes to CodeCommit or S3 | ||
|
||
3. Release the `AWSAccelerator-Pipeline` to finalize the deployment of the Active Directory configuration instance. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This was moved because it cut the ALB forwarding
section into two and broke the flow of the document
@@ -103,7 +112,7 @@ Some configuration elements need to be updated when using ControlTower | |||
- global-config.yaml | |||
* Update `managementAccountAccessRole` value to `AWSControlTowerExecution` | |||
* Update `controlTower` to `enable: true` | |||
* Uncomment the `landingZone` block | |||
* Uncomment the `landingZone` block (only if it is a new Organization with zero accounts other than the Management Account) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Per Auto-deploy AWS Control Tower by the solution (recommended)
:
There are no AWS services enabled for AWS Organizations.
There are no organization units created in the AWS Organizations.
The only AWS account in the AWS Organization is the management account.
Issue #, if available:
No open issue
Description of changes:
After following the documentation, I found some of the formatting and wording slightly hard to follow.
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.