Options

ℹ️
Configuration values are stored in AWS Parameter Store. The installer script automatically creates these based on your selections.

All Shared Options

Parameter values are prefix scoped to specific deployments with /doctran/<instanceName>/.
E.g. /doctran/main/common/instance/name = “main”

Option Parameter SuffixExample valueDefaultRequired?Description
Common
common/instance/namemain, test, foomainYesAccount unique name for this deployment
common/development/enabletrue, falsefalseNoEnable development features. Only use in test/dev environments
Pipeline
Pipeline - Source
pipeline/source/repoBranchrelease/testNAYesUpstream branch to track for updates
pipeline/source/repoOwneraws-samplesaws-samplesNoUpstream repo owner to track for updates
pipeline/source/repoNamedocument-translationdocument-translationNoUpstream repo name to track for updates
pipeline/source/repoHook/enabletrue, falsefalse. true if permittedNoIntegrate with GitHub via repo hook. Requires GitHub Token permissions
Pipeline - Misc
pipeline/removalPolicydestroy, snapshot, retainretainNoRemoval policy for deployed pipeline components
Pipeline - Approvals
pipeline/approvals/preCdkSynth/enabletrue, falsetrueNoRequire manual approval before CDK Synth can run in the pipeline
pipeline/approvals/preCdkSynth/emailfoo@example.comNAIf using approvalTarget email for manual approval
App
App - Misc
app/removalPolicydestroy, snapshot, retainretainNoRemoval policy for deployed app components
App - Cognito - Local
app/cognito/localUsers/enabletrue, falsefalseIf not using SAML usersEnable locally managed users
app/cognito/localUsers/mfa/enforcementrequired, optional, offoffNoEnable MFA for locally managed users
app/cognito/localUsers/mfa/otptrue, falsefalseNoEnable OTP MFA for locally managed users
app/cognito/localUsers/mfa/smstrue, falsefalseNoEnable SMS MFA for locally managed users
App - Cognito - SAML
app/cognito/saml/enabletrue, falsefalseIf not using local usersEnable SAML managed users
app/cognito/saml/metadataUrlhttps://domain.tld/metadata.xmlNAIf using SAML usersMetadata XML from the SAML provider
App - WebUI
app/webUi/enabletrue, falsefalseNoEnable web UI for using this solution
app/webUi/customDomain/enabletrue, falsefalseEnable custom domain name for the web UI
app/webUi/customDomain/certificateArnarn:aws:acm:us-east-1:....NAIf using custom domainACM Certificate ARN for the custom domain name
app/webUi/customDomain/domaintransform.exampe.comNAIf using custom domainCustom domain name

User Authentication

This solution supports two sources of user authentication. These can be enabled individually or together.

  1. AWS Cognito Local Users. See app/cognito/localUsers/*
  • Recommended for testing
  • Users are managed within the AWS Account
  • Users are not linked to existing user directories
  • Configurable MFA settings
  1. AWS Cognito SAML Users. See app/cognito/saml/*
  • Recommended for production usage
  • Users are managed by a SAML provider
  • Users are linked to existing user directories
  • Configuration of SAML provider is out of scope for this installation guide

Enable Cognito SAML Provider Users

To integrate this solution with your existing user accounts it is integrated via SAML 2.0. This is supported by most user management systems, such as Azure Active Directory. A metadata URL is provided by the SAML provider and used by this solution. This URL looks like this https://login.microsoftonline.com/yyyyyyyy-yyyy-yyyy-yyyy-yyyyyyyyyyyy/federationmetadata/2007-06/federationmetadata.xml?appid=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx. Configuration of Azure AD is out of scope for this installation guide.

This installation guide assumes that the user directory used for the SAML provider is Azure Active Directory. Configuration of Azure AD is out of scope for this installation guide. An Enterprise Application will need to be created. Dummy information can be used for the “Identifier (Entity ID)” and “Reply URL (Assertion Consumer Service URL)” to be updated later in this guide. The “App Federation Metadata Url” is a dependency for this guide.

See app/cognito/saml/metadataUrl