Skip to content

Commit 7b60833

Browse files
fix: few technical terms getting ``
1 parent ebb7ac4 commit 7b60833

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -908,7 +908,7 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
908908
- [x] Allow the EC2 IAM role the permission to assume the AccessPII role.
909909
- [ ] Allow the EC2 IAM role the permission to access the PII table.
910910
- [ ] Include the AWS API in the application code logic to obtain temporary credentials from the EC2 IAM role to access the PII table.
911-
- [x] Include the AssumeRole API operation in the application code logic to obtain temporary credentials to access the PII table.
911+
- [x] Include the `AssumeRole` API operation in the application code logic to obtain temporary credentials to access the PII table.
912912
- [ ] Include the GetSessionToken API operation in the application code logic to obtain temporary credentials to access the PII table.
913913

914914
**[⬆ Back to Top](#table-of-contents)**
@@ -1301,7 +1301,7 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
13011301

13021302
- [ ] Use the Amazon Cognito user pools to get short-lived credentials for the second account.
13031303
- [ ] Create a dedicated IAM access key for the second account, and send it by mail.
1304-
- [x] Create a cross-account access role, and use sts: AssumeRole API to get short-lived credentials.
1304+
- [x] Create a cross-account access role, and use `sts:AssumeRole` API to get short-lived credentials.
13051305
- [ ] Establish trust, and add an SSH key for the second account to the IAM user.
13061306

13071307
**[⬆ Back to Top](#table-of-contents)**
@@ -1618,7 +1618,7 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
16181618
- [ ] Use S3 bucket policies to restrict read access to specific IAM users.
16191619
- [x] Use Amazon Cognito to provide access using authenticated and unauthenticated roles.
16201620
- [ ] Create a new IAM user for each user and grant read access.
1621-
- [x] Use the AWS IAM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) AssumeRole action depending on the type of user and provide read access to Amazon S3 using the assumed role.
1621+
- [x] Use the AWS IAM service and let the application assume the different roles using the AWS Security Token Service (AWS STS) `AssumeRole` action depending on the type of user and provide read access to Amazon S3 using the assumed role.
16221622

16231623
**[⬆ Back to Top](#table-of-contents)**
16241624

@@ -3332,8 +3332,8 @@ We are so thankful for every contribution, which makes sure we can deliver top-n
33323332

33333333
- [x] Use Amazon Cognito with web identity federation.
33343334
- [ ] Use Amazon Cognito with SAML-based identity federation.
3335-
- [ ] Use AWS IAM Access/Secret keys in the application code to allow Get* on the S3 bucket.
3336-
- [ ] Use AWS STS AssumeRole in the application code and assume a role with Get* permissions on the S3 bucket.
3335+
- [ ] Use AWS IAM Access/Secret keys in the application code to allow `Get*` on the S3 bucket.
3336+
- [ ] Use AWS STS `AssumeRole` in the application code and assume a role with `Get*` permissions on the S3 bucket.
33373337

33383338
**[⬆ Back to Top](#table-of-contents)**
33393339

0 commit comments

Comments
 (0)