diff --git a/docs/identity/saas-apps/amazon-web-service-tutorial.md b/docs/identity/saas-apps/amazon-web-service-tutorial.md index 5ab67e5efb9..8dc91121aa3 100644 --- a/docs/identity/saas-apps/amazon-web-service-tutorial.md +++ b/docs/identity/saas-apps/amazon-web-service-tutorial.md @@ -125,7 +125,10 @@ Follow these steps to enable Microsoft Entra SSO. ![Screenshot showing Edit Basic SAML Configuration.](common/edit-urls.png) -1. In the **Basic SAML Configuration** section, update both **Identifier (Entity ID)** and **Reply URL** with the same default value: `https://signin.aws.amazon.com/saml`. You must select **Save** to save the configuration changes. +1. In the **Basic SAML Configuration** section, update both **Identifier (Entity ID)** and **Reply URL** with correct values. You must select **Save** to save the configuration changes. + +> [!Note] +> If configuring multiple instances of the AWS applications, do not add the values of **#1** or **#2** and so on, to the **Reply URL** value. Consult AWS documentation for correct **Reply URL** value. 1. AWS application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows the list of default attributes.