

# Extension access
<a name="extension-access"></a>

Extension access connects your Amazon Quick account to third party applications like Microsoft Teams, Microsoft Outlook, Microsoft Word, and Slack. Think of it as giving permission for Amazon Quick to work inside the apps your team already uses, helping them accomplish their work, assisted by generative AI, and without context switching.

As an admin, you configure extension access. Then, either an admin or an author must install the extension in the Amazon Quick console to make the extension available to end users. This default extension is available for use to all users on eligible subscriptions after setup. Installed extensions are available under **Connections** > **Extensions** in the Amazon Quick menu for further configuration and management.

If you're an admin user of Amazon Quick, you configure Amazon Quick access to extensions, and can also deploy extensions for end user use. As an admin, you can also allow authors to edit and deploy extensions after you configure access.

User roles and extension permissions work as follows:
+ **IAM Administrators:** Can enable/remove extension access, create extensions, assign owners, and control extension availability for the organization.
+ **Authors:** Can create and install extensions using administrator-enabled access, and edit/delete extensions they own.
+ **Readers (Reader Pro only):** Can use all enabled extensions but cannot create or modify them.

Here's what you need to know about extension access:
+ **What it is:** A secure connection between your Amazon Quick instance and your organization's account in third-party apps (like your Microsoft 365 or Slack workspace).
+ **Why it matters:** It gives your Amazon Quick instance permission to work within your organization's specific tenant or workspace in these apps.
+ **Who sets it up:** Only administrators with IAM credentials can configure extension access and deploy extensions (or give authors permission to edit and deploy extensions) - it's a privileged operation that must be done before your team can start using extensions. Note that IAM admin users can access the **Extension access** pages from the **Manage Quick** menu, but to configure a extension they may need to re-log in to the system and select **Connections** > **Extensions** from the Amazon Quick menu.

**Topics**
+ [Browser extension](browser-extension.md)
+ [Amazon Quick Microsoft Outlook extension](outlook-extension.md)
+ [Amazon Quick Slack extension](slack-extension.md)
+ [Amazon Quick Microsoft Word extension](word-extension.md)
+ [Amazon Quick Microsoft Teams extension](teams-extension.md)

# Browser extension
<a name="browser-extension"></a>

The Amazon Quick browser extension is available within Amazon Quick to all eligible users by default and requires no administrative setup for user access. Users can find the browser extension installation link under **Connections** > **Extensions**. The following procedures are for IT administrators who want to automatically deploy or disable the Amazon Quick browser extension across all browsers in their organization using managed device policies.

**Topics**
+ [Deploy the browser extension](#browser-extension-deployment)
+ [Disable the browser extension](#disable-browser-extension)

## Deploy the browser extension
<a name="browser-extension-deployment"></a>

**Note**  
The following deployment guide applies only when you have a managed device fleet with managed browsers.

To deploy the browser extension to all users in your organization, you can define an **ExtensionSettings** policy and distribute this policy to your managed devices.

**Topics**
+ [Install using ExtensionSettings policy](#install-by-extensionsettings)
+ [Distribute ExtensionSettings policy](#distributing-extensionsettings)

### Install using ExtensionSettings policy
<a name="install-by-extensionsettings"></a>

The **ExtensionSettings** policy is an administrative setting for Chrome, Edge, and Firefox that allows you to manage the installation, permissions, and runtime behavior of specific extensions on managed devices. This policy provides granular control by letting administrators specify custom configurations, such as setting installation modes like force install and restricting or allowing specific site access and permissions for individual extensions or all extensions.

The format of the **ExtensionSettings** policy depends on the operating system where you want to distribute this policy. Windows, Mac, and Linux are supported.

To set the install mode in the **ExtensionSettings** policy, you need the extension identifier and the store URL:
+ **Chrome/Edge**
  + ID: `innkphffipcmiflfibbeghfnkifiokgo`
  + URL: `https://clients2.google.com/service/update2/crx`
+ **Firefox**
  + ID: `quick-browser-extension@amazon.com`
  + URL: `https://addons.mozilla.org/firefox/downloads/latest/amazon-quick/latest.xpi`

### Distribute ExtensionSettings policy
<a name="distributing-extensionsettings"></a>

Distributing the **ExtensionSettings** policy depends on the device and browser management solution used by your organization. You can use managed solutions like **Chrome Enterprise Core** or **Microsoft Edge** management service, or distribute the **ExtensionSettings** policy using **Group Policy**, which differs per operating system.

## Disable the browser extension
<a name="disable-browser-extension"></a>

**Note**  
The following deployment guide applies only when you have a managed device fleet with managed browsers.

To disable the browser extension for all users in your organization, you can define an **ExtensionSettings** policy and distribute this policy to your managed devices.

**Topics**
+ [Disable using ExtensionSettings policy](#disable-by-extensionsettings)
+ [Distribute ExtensionSettings policy](#distributing-extensionsettings-disable)

### Disable using ExtensionSettings policy
<a name="disable-by-extensionsettings"></a>

The **ExtensionSettings** policy is an administrative setting for Chrome, Edge, and Firefox that allows you to manage the installation, permissions, and runtime behavior of specific extensions on managed devices. This policy provides granular control by letting administrators specify custom configurations, such as disabling individual extensions.

The format of the **ExtensionSettings** policy depends on the operating system where you want to distribute this policy. See the documentation for the **ExtensionSettings** policy to determine the format. Windows, Mac, and Linux are supported.

To block the use of the extension in the **ExtensionSettings** policy, you need the extension identifier:
+ **Chrome/Edge**

  ID: `innkphffipcmiflfibbeghfnkifiokgo`
+ **Firefox**

  ID: `quick-browser-extension@amazon.com`

### Distribute ExtensionSettings policy
<a name="distributing-extensionsettings-disable"></a>

Distributing the **ExtensionSettings** policy depends on the device and browser management solution used by your organization. You can use managed solutions like **Chrome Enterprise Core** or **Microsoft Edge** management service, or distribute the **ExtensionSettings** policy using **Group Policy**, which differs per operating system.

# Amazon Quick Microsoft Outlook extension
<a name="outlook-extension"></a>

The Quick extension for Microsoft Outlook integrates AI-powered assistance directly into your email workflows. Users can access Quick capabilities within Outlook to enhance their email communication and productivity without switching between applications.

The Outlook extension enables users to:
+ Summarize emails for quick understanding.
+ Draft contextual responses with AI assistance.
+ Use actions from action connectors configured in Amazon Quick.
+ Access any company knowledge sources added to your Amazon Quick instance from within Microsoft Outlook.

**Important**  
The Amazon Quick customer integrating Microsoft Outlook must have a paid Microsoft Outlook organization with an *M365 subscription for their organization*.
Amazon Quick does not use your user data for service improvement or for training its underlying large language models (LLMs).

**Topics**
+ [Prerequisites for Microsoft Outlook extension](#outlook-prerequisites)
+ [Configure Microsoft Outlook extension access](#configure-outlook-extension)

## Prerequisites for Microsoft Outlook extension
<a name="outlook-prerequisites"></a>

Before configuring access to the Amazon Quick extension to Microsoft Outlook, administrators must complete the following steps:

1. Have a Microsoft 365 Business subscription and be a Global Admin or have administrative permissions (specifically `AppCatalog.ReadWrite.All`).

1. Have a Amazon Quick instance.

1. Your Microsoft 365 tenant ID. You can find this by going to the Azure portal > **Azure Active Directory** > **Properties**, or by using PowerShell. For detailed steps, see [How to find your tenant ID - Microsoft Entra](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant) in the Microsoft Learn portal.

If you configured the authentication to connect to Amazon Quick with IAM Identity Center, complete the following additional steps:

1. Ensure you have an IAM Identity Center instance enabled on your AWS account.

1. If you are connecting an external IAM provider to IAM Identity Center, ensure that every user under your IAM provider configuration has an email associated with them. 

1. If you are using Entra ID, set up SCIM identity propagation between the Microsoft Entra ID instance and IAM Identity Center. For detailed steps, see [Configure SAML and SCIM with Microsoft Entra ID and IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/azure-ad-idp.html).

## Configure Microsoft Outlook extension access
<a name="configure-outlook-extension"></a>

As an administrator, you must allow the Amazon Quick Microsoft Outlook extension to connect to your Amazon Quick application environment. You can use the Amazon Quick console to manage extension access configurations.

### User attribute mapping
<a name="outlook-user-attributes"></a>

When you configure a Microsoft Outlook extension, user identity is mapped by default using the following attributes:
+ **Amazon Quick user attribute** - Email address is used to map Amazon Quick users to their corresponding Microsoft 365 accounts. The system uses the email address to establish the connection between user identities.
+ **M365 Office add-in user attribute** - User Principal Name (UPN) is used to match against Microsoft 365 user accounts. Users need to use the User Principal Name (UPN) to sign in to Microsoft 365. Email address that works on both cloud and on-premise systems.

These default mappings ensure secure and accurate user identification across both platforms without requiring additional configuration.

**Topics**
+ [User attribute mapping](#outlook-user-attributes)
+ [Add Microsoft Outlook extension access for accounts using IAM Identity Center](#add-outlook-extension-access-idc)
+ [Add Microsoft Outlook extension access for accounts using other authentication methods](#add-outlook-extension-access)
+ [Edit Microsoft Outlook extension access](#edit-outlook-extension-access)
+ [Delete Microsoft Outlook extension access](#delete-outlook-extension-access)

### Add Microsoft Outlook extension access for accounts using IAM Identity Center
<a name="add-outlook-extension-access-idc"></a>

Configuring extension access with IAM Identity Center requires completing steps specific to your identity provider (Entra ID or Okta) followed by common setup steps in AWS.

#### Configure IAM Identity Center with Entra ID
<a name="configure-idc-entra-id"></a>

Follow these steps only if you are using IAM Identity Center with Entra ID to set up and configure an Azure tenant on your Microsoft Azure portal:

**To set up an Azure tenant**

1. In the Azure account, create a new app registration.

   1. Go to **App registrations**.

   1. In the **App registrations** screen, choose **New registration**. Under the **Supported account types** option, choose **Accounts in this organizational directory only (Personal use only - Single tenant)**. Once finished, choose **Register**.

   1. Note the client ID. You will need this later.

   1. Create a client secret for the app registration and keep note of it. You will need this later.

1. Add callback URLs for each Region in which your Outlook extension will be installed.

   1. Navigate to the app registration's **Authentication** tab.

   1. Choose **Platform Configurations**, **Add a platform**.

   1. Choose **Web**.

   1. Compose a callback URL using the following format, replacing *your-region* with your Amazon Quick instance Region. The Outlook extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Insert the callback URL as the redirect URI and choose **Configure** when done.

Follow these steps to configure a Trusted Token Issuer on your IAM Identity Center instance in your AWS Console:

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings**, **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *Tenant ID* refers to your Entra tenant ID:

   ```
   login.microsoftonline.com/Tenant ID/v2.0
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Entra ID-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-outlook) section below.

#### Configure IAM Identity Center with Okta
<a name="configure-idc-okta"></a>

Follow these steps only if you are using IAM Identity Center with Okta to set up and configure your App Integration in the Okta Admin console:

**To set up an Okta Application**

1. In your Okta account, create a new Okta App Integration.

   1. In your Okta Admin console, navigate to **Applications** > **Applications**.

   1. Click on **Create App Integration**.

   1. For the Sign-in method, select **OIDC - OpenID Connect**.

   1. For the Application type, select **Web Application**.

   1. Click on **Next**.

   1. Provide an App integration name.

   1. Under **Grant type** > **Core grants**, ensure **Authorization Code** and **Refresh Token** are selected.

   1. Under **Grant type** > **Advanced** > **Other grants**, ensure **Implicit (hybrid)** is selected.

1. Add callback URIs for each Region in which your Outlook extension will be installed

   1. Compose a callback URI using the following format, replacing *your-region* with your Amazon Quick instance Region for each region where you wish to configure the extension. The Outlook extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Under **Sign-in redirect URIs**, click on **Add URI** and paste each of the URIs you generated from the previous step.

1. Provide your organization access to the app:

   1. Under **Assignments** > **Controlled access**, select the groups in your organization that need to have access.

   1. Under **Assignments** > **Enable immediate access**, select **Enable immediate access with Federation Broker Mode**.

   1. Click on **Save**.

1. Note down the **Client ID** and **Client Secret** for the app integration you just created. You will need this in the next steps.

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings** > **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *yourOktaDomain* refers to the okta URL for your organization, which may look like `your-organization.okta.com`:

   ```
   https://{yourOktaDomain}/oauth2/default
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Okta-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-outlook) section below.

#### Complete AWS Configuration (all providers)
<a name="complete-aws-config-outlook"></a>

Follow these steps to set up permissions on AWS Console:

**To set up permissions**

1. Navigate to Secrets Manager on AWS console.

1. Choose **Store a new secret**.

1. Choose **Other type of secret** and choose the **Plaintext** tab.

1. Your secret should be in the following format and use the app registration client ID and app registration client secret that you saved from the earlier steps:

   ```
   {
       "client_id":"Your app registration client ID",
       "client_secret":"Your app registration client secret"
   }
   ```

1. Navigate to the secret you just created and save the ARN for later.

1. Now navigate to IAM on AWS console.

1. Choose **Access Management**, **Roles** in the left navigation bar.

1. Choose **Create role**.

1. Choose **Custom trust policy**.

1. Configure the role to trust our service principal for the relevant Region that you selected when configuring your identity provider app integration by adding the following statement replacing *your-region* with the Region you chose when creating your identity provider app integration:

   ```
   {
       "Version": "2012-10-17", 		 	 	 
       "Statement": [
           {
               "Effect": "Allow",
               "Principal": {
                   "Service": "your-region.prod.appintegrations.plato.aws.internal"
               },
               "Action": "sts:AssumeRole",
               "Condition": {}
           }
       ]
   }
   ```

1. Choose **Next**.

1. Provide a name and description and choose **Create role**.

1. Navigate to the role you just created and choose it.

1. Choose **Add Permissions**, **Create inline policy**.

1. Choose **JSON**.

1. Configure the role with permissions to read secrets from Secrets Manager and permissions to invoke `sso:DescribeTrustedTokenIssuer` by adding the following statement:

   ```
   {
       "Version": "2012-10-17", 		 	 	 
       "Statement": [
           {
               "Sid": "BasePermissions",
               "Effect": "Allow",
               "Action": [
                   "secretsmanager:GetSecretValue",
                   "sso:DescribeTrustedTokenIssuer"
               ],
               "Resource": "*"
           }
       ]
   }
   ```

1. Provide a policy name and choose **Create policy**.

1. Copy and save the ARN of the IAM role you created for later. You will need it in the next steps.

Now you can follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Outlook environment:

**To create an extension access configuration**

1. Sign in to the Amazon Quick console.

1. In the top right, choose the profile picture icon.

1. From the drop-down menu, choose **Manage account**.

1. Under **Permissions**, choose **Extension access**.

1. In the top right, choose **New extension access**.

1. If this is your first time setting up extension access, you are prompted to complete the **Trusted Token Issuer Setup**. Configure the following fields and then choose **Next**:
   + **Trusted Token Issuer ARN** – Enter the trusted token issuer ARN that you noted from the earlier steps.
   + **Aud claim** – Enter the client ID from your app registration (Entra ID) or app integration (Okta) that you saved from the earlier steps.
**Note**  
This is a one-time setup that establishes a trusted identity source for all extensions. Once completed, you won't need to do this again for other extension accesses.

1. Select **Microsoft Outlook**. Then, choose **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Outlook extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description (optional)** - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).
   + **Secrets Role ARN** - Paste the ARN of the IAM role you created from the previous steps.
   + **Secrets ARN** - Paste the ARN of the Secrets Manager secret you created from the previous steps.

1. Choose **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, choose **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Microsoft Outlook environment.

**Note**  
For your end users to begin using your Microsoft Outlook extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see Installing your Microsoft Outlook extension in the Microsoft Outlook extension author guide.

### Add Microsoft Outlook extension access for accounts using other authentication methods
<a name="add-outlook-extension-access"></a>

Follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Outlook environment.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. In the top right, select **New extension access**.

1. Select **Microsoft Outlook**. Then, **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Outlook extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description** (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).

1. Select **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, select **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Microsoft Outlook environment.

**Note**  
For your end users to begin using your Microsoft Outlook extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see [Installing your Microsoft Outlook extension in the Microsoft Outlook extension author guide](https://docs.aws.amazon.com/quicksuite/latest/userguide/outlook-extension-author-guide.html#add-extensions-outlook).

### Edit Microsoft Outlook extension access
<a name="edit-outlook-extension-access"></a>

Use these steps to modify the configuration settings of an existing Microsoft Outlook extension access.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Microsoft Outlook extension you need to edit.

1. Select **Edit**.

1. Edit the configuration as required and select **Save** to confirm the changes.

Your changes to the Microsoft Outlook extension access configuration are saved and will take effect immediately.

### Delete Microsoft Outlook extension access
<a name="delete-outlook-extension-access"></a>

Follow these steps to permanently remove a Microsoft Outlook extension access configuration. This action cannot be undone.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Microsoft Outlook Extension you need to delete.

1. Select **Delete**.

1. Enter the word, "confirm", and select **DELETE**.

**Note**  
Deleting a extension access removes access for all users in your M365 tenant and deletes all extensions created for Outlook. If delete extension access fails, the admin must switch to the author view and delete the Outlook extensions that are using the configured extension access before returning to delete the extension access. 

With Microsoft Outlook extension access configured, your team can now use Amazon Quick to enhance their email workflows with AI-powered assistance for summarizing, drafting responses, and accessing organizational knowledge directly within Outlook.

# Amazon Quick Slack extension
<a name="slack-extension"></a>

The Quick extension for Slack integrates AI-powered assistance directly into your team communication workflows. Users can access Quick knowledge and capabilities within Slack channels and direct messages without switching between applications.

The Slack extension enables users to:
+ Add Amazon Quick as a collaborator using **@Amazon Quick** mentions.
+ Get conversation summaries and insights.
+ Access organizational knowledge bases and documents directly from Slack channels.
+ Generate notes and action items from discussions in Slack threads.
+ Get help with data analysis and report generation using uploaded files.

**Important**  
When Amazon Quick is used in public Slack channels, responses are based on the invoking user's permissions. This may include content that other channel members aren't authorized to access. Carefully evaluate using Amazon Quick in public channels to prevent unintended exposure of sensitive information.
Amazon Quick does not use your user data for service improvement or for training its underlying large language models (LLMs).

**Topics**
+ [Prerequisites for Slack extension](#slack-prerequisites)
+ [Configure Slack extension access](#configure-slack-extension)

## Prerequisites for Slack extension
<a name="slack-prerequisites"></a>

Before adding the Amazon Quick Slack Extension, administrators must complete the following requirements:
+ Have a paid Slack workspace.
+ Have admin access to your Slack workspace.
+ Get started with Amazon Quick.
+ Your Slack workspace ID (must start with 'T' and be alphanumeric). One way to find your Slack workspace ID is by navigating to your Slack workspace and starting a chat with the Slack Developer Tools app running the `/sdt whoami` command. For more information, see [Locate your Slack URL or ID](https://slack.com/help/articles/221769328-Locate-your-Slack-URL-or-ID) in the Slack help center.

If you configured the authentication to connect to Amazon Quick with IAM Identity Center, complete the following additional steps:

1. Ensure you have an IAM Identity Center instance enabled on your AWS account.

1. If you are connecting an external IAM provider to IAM Identity Center, ensure that every user under your IAM provider configuration has an email associated with them.

1. If you are using Entra ID, set up SCIM identity propagation between the Microsoft Entra ID instance and IAM Identity Center. For detailed steps, see [Configure SAML and SCIM with Microsoft Entra ID and IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/azure-ad-idp.html).

## Configure Slack extension access
<a name="configure-slack-extension"></a>

As an administrator, you must allow your Amazon Quick Slack extension to connect to your Amazon Quick application environment. You can use the Amazon Quick console to manage extension access configurations.

### User attribute mapping
<a name="slack-user-attributes"></a>

When you configure a Slack extension, user identity is mapped by default using the following attributes:
+ **Amazon Quick user attribute** - Email address is used to map Amazon Quick users to their corresponding Slack accounts. The system uses the email address to establish the connection between user identities.
+ **Slack user attribute** - User Profile Email is used to match against Slack user accounts. This maps to the email address associated with the user's Slack profile.

These default mappings ensure secure and accurate user identification across both platforms without requiring additional configuration.

**Topics**
+ [User attribute mapping](#slack-user-attributes)
+ [Add Slack extension access for accounts using IAM Identity Center](#add-slack-extension-access-idc)
+ [Add Slack extension access for accounts using other authentication methods](#add-slack-extension-access)
+ [Edit Slack extension access](#edit-slack-extension-access)
+ [Delete Slack extension access](#delete-slack-extension-access)

### Add Slack extension access for accounts using IAM Identity Center
<a name="add-slack-extension-access-idc"></a>

Configuring extension access with IAM Identity Center requires completing steps specific to your identity provider (Entra ID or Okta) followed by common setup steps in AWS.

#### Configure IAM Identity Center with Entra ID
<a name="configure-idc-entra-id"></a>

Follow these steps only if you are using IAM Identity Center with Entra ID to set up and configure an Azure tenant on your Microsoft Azure portal:

**To set up an Azure tenant**

1. In the Azure account, create a new app registration.

   1. Go to **App registrations**.

   1. In the **App registrations** screen, choose **New registration**. Under the **Supported account types** option, choose **Accounts in this organizational directory only (Personal use only - Single tenant)**. Once finished, choose **Register**.

   1. Note the client ID. You will need this later.

   1. Create a client secret for the app registration and keep note of it. You will need this later.

1. Add callback URLs for each Region in which your Slack extension will be installed.

   1. Navigate to the app registration's **Authentication** tab.

   1. Choose **Platform Configurations**, **Add a platform**.

   1. Choose **Web**.

   1. Compose a callback URL using the following format, replacing *your-region* with your Amazon Quick instance Region. The Slack extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Insert the callback URL as the redirect URI and choose **Configure** when done.

Follow these steps to configure a Trusted Token Issuer on your IAM Identity Center instance in your AWS Console:

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings**, **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *Tenant ID* refers to your Entra tenant ID:

   ```
   login.microsoftonline.com/Tenant ID/v2.0
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Entra ID-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-slack) section below.

#### Configure IAM Identity Center with Okta
<a name="configure-idc-okta"></a>

Follow these steps only if you are using IAM Identity Center with Okta to set up and configure your App Integration in the Okta Admin console:

**To set up an Okta Application**

1. In your Okta account, create a new Okta App Integration.

   1. In your Okta Admin console, navigate to **Applications** > **Applications**.

   1. Click on **Create App Integration**.

   1. For the Sign-in method, select **OIDC - OpenID Connect**.

   1. For the Application type, select **Web Application**.

   1. Click on **Next**.

   1. Provide an App integration name.

   1. Under **Grant type** > **Core grants**, ensure **Authorization Code** and **Refresh Token** are selected.

   1. Under **Grant type** > **Advanced** > **Other grants**, ensure **Implicit (hybrid)** is selected.

1. Add callback URIs for each Region in which your Slack extension will be installed

   1. Compose a callback URI using the following format, replacing *your-region* with your Amazon Quick instance Region for each region where you wish to configure the extension. The Slack extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Under **Sign-in redirect URIs**, click on **Add URI** and paste each of the URIs you generated from the previous step.

1. Provide your organization access to the app:

   1. Under **Assignments** > **Controlled access**, select the groups in your organization that need to have access.

   1. Under **Assignments** > **Enable immediate access**, select **Enable immediate access with Federation Broker Mode**.

   1. Click on **Save**.

1. Note down the **Client ID** and **Client Secret** for the app integration you just created. You will need this in the next steps.

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings** > **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *yourOktaDomain* refers to the okta URL for your organization, which may look like `your-organization.okta.com`:

   ```
   https://{yourOktaDomain}/oauth2/default
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Okta-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-slack) section below.

#### Complete AWS Configuration (all providers)
<a name="complete-aws-config-slack"></a>

Follow these steps to set up permissions on AWS Console:

**To set up permissions**

1. Navigate to Secrets Manager on AWS console.

1. Choose **Store a new secret**.

1. Choose **Other type of secret** and choose the **Plaintext** tab.

1. Your secret should be in the following format and use the app registration client ID and app registration client secret that you saved from the earlier steps:

   ```
   {
       "client_id":"Your app registration client ID",
       "client_secret":"Your app registration client secret"
   }
   ```

1. Navigate to the secret you just created and save the ARN for later.

1. Now navigate to IAM on AWS console.

1. Choose **Access Management**, **Roles** in the left navigation bar.

1. Choose **Create role**.

1. Choose **Custom trust policy**.

1. Configure the role to trust our service principal for the relevant Region that you selected when configuring your identity provider app integration by adding the following statement replacing *your-region* with the Region you chose when creating your identity provider app integration:

   ```
   {
       "Version": "2012-10-17", 		 	 	 
       "Statement": [
           {
               "Effect": "Allow",
               "Principal": {
                   "Service": "your-region.prod.appintegrations.plato.aws.internal"
               },
               "Action": "sts:AssumeRole",
               "Condition": {}
           }
       ]
   }
   ```

1. Choose **Next**.

1. Provide a name and description and choose **Create role**.

1. Navigate to the role you just created and choose it.

1. Choose **Add Permissions**, **Create inline policy**.

1. Choose **JSON**.

1. Configure the role with permissions to read secrets from Secrets Manager and permissions to invoke `sso:DescribeTrustedTokenIssuer` by adding the following statement:

   ```
   {
       "Version": "2012-10-17", 		 	 	 
       "Statement": [
           {
               "Sid": "BasePermissions",
               "Effect": "Allow",
               "Action": [
                   "secretsmanager:GetSecretValue",
                   "sso:DescribeTrustedTokenIssuer"
               ],
               "Resource": "*"
           }
       ]
   }
   ```

1. Provide a policy name and choose **Create policy**.

1. Copy and save the ARN of the IAM role you created for later. You will need it in the next steps.

Now you can follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Slack environment:

**To create an extension access configuration**

1. Sign in to the Amazon Quick console.

1. In the top right, choose the profile picture icon.

1. From the drop-down menu, choose **Manage account**.

1. Under **Permissions**, choose **Extension access**.

1. In the top right, choose **New extension access**.

1. If this is your first time setting up extension access, you are prompted to complete the **Trusted Token Issuer Setup**. Configure the following fields and then choose **Next**:
   + **Trusted Token Issuer ARN** – Enter the trusted token issuer ARN that you noted from the earlier steps.
   + **Aud claim** – Enter the client ID from your app registration (Entra ID) or app integration (Okta) that you saved from the earlier steps.
**Note**  
This is a one-time setup that establishes a trusted identity source for all extensions. Once completed, you won't need to do this again for other extension accesses.

1. Select **Slack**. Then, choose **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Slack extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description (optional)** - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **Slack Workspace ID** - Enter your Slack workspace identifier. Workspace IDs must start with 'T' and be between 1 and 256 alphanumeric characters.
   + **Secrets Role ARN** - Paste the ARN of the IAM role you created from the previous steps.
   + **Secrets ARN** - Paste the ARN of the Secrets Manager secret you created from the previous steps.

1. Choose **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, choose **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Slack environment.

**Note**  
For your end users to begin using your Slack extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see Installing your Slack extension in the Slack extension author guide.

### Add Slack extension access for accounts using other authentication methods
<a name="add-slack-extension-access"></a>

Follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Slack environment.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. In the top right, select **New extension access**.

1. Select Slack, then, **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Slack extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description** (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **Slack Workspace ID** - Enter your Slack workspace identifier. Workspace ID must start with T and be between 1 and 256 alphanumeric characters long.

1. Select **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, select **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admins in your organization to deploy Amazon Quick Slack extensions in their workspace.

**Note**  
For your end users to begin using your Slack extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see [Installing your Slack extension in the Slack extension author guide](https://docs.aws.amazon.com/quicksuite/latest/userguide/slack-extension-author-guide.html#add-extensions-slack).

### Edit Slack extension access
<a name="edit-slack-extension-access"></a>

Use these steps to modify the configuration settings of an existing Slack extension access.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Slack Extension you need to edit.

1. Select **Edit**.

1. Edit the configuration as required and select **Save** to confirm the changes.

Your changes to the Slack extension access configuration are saved and will take effect immediately.

### Delete Slack extension access
<a name="delete-slack-extension-access"></a>

Follow these steps to permanently remove a Slack extension access configuration. This action cannot be undone.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Slack Extension you need to delete.

1. Select **Delete**.

1. Enter the word, "confirm", and select **DELETE**.

**Note**  
Deleting a extension access removes access for all users in your Slack workspace and deletes all extensions created for Slack. If delete extension access fails, the admin must switch to the author view and delete the Slack extensions that are using the configured extension access before returning to delete the extension access.

With Slack extension access configured, your team can now use **@Amazon Quick** mentions in channels and direct messages to access AI assistance and organizational knowledge directly within their Slack workspace.

# Amazon Quick Microsoft Word extension
<a name="word-extension"></a>

The Quick extension for Microsoft Word integrates AI-powered assistance directly into your document creation and editing workflows. Users can access Quick capabilities within Word to enhance their document productivity and content quality without switching between applications.

The Word extension enables users to:
+ Review, draft, and revise documents with AI assistance.
+ Summarize documents and get insights.
+ Simplify and improve writing quality.
+ Use actions from action connectors configured in Amazon Quick.
+ Access any company knowledge sources added to your Amazon Quick instance from within Microsoft Word.

**Important**  
The Amazon Quick customer integrating Microsoft Word must have a paid Word organization with an *M365 subscription for their organization*.
Amazon Quick does not use user data for service improvement or for training its underlying large language models (LLMs).

**Topics**
+ [Prerequisites for Microsoft Word extension](#word-prerequisites)
+ [Configure Microsoft Word extension access](#configure-word-extension)

## Prerequisites for Microsoft Word extension
<a name="word-prerequisites"></a>

Before adding the Amazon Quick extension to Microsoft Word, administrators must complete the following steps:

1. Have a Microsoft 365 Business subscription and be a Global Admin or have administrative permissions (specifically `AppCatalog.ReadWrite.All`).

1. Have a Amazon Quick instance.

1. Your Microsoft 365 tenant ID. You can find this by going to the Azure portal > **Azure Active Directory** > **Properties**, or by using PowerShell. For detailed steps, see [How to find your tenant ID - Microsoft Entra](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant) in the Microsoft Learn portal.

If you configured the authentication to connect to Amazon Quick with IAM Identity Center, complete the following additional steps:

1. Ensure you have an IAM Identity Center instance enabled on your AWS account.

1. If you are connecting an external IAM provider to IAM Identity Center, ensure that every user under your IAM provider configuration has an email associated with them.

1. If you are using Entra ID, set up SCIM identity propagation between the Microsoft Entra ID instance and IAM Identity Center. For detailed steps, see [Configure SAML and SCIM with Microsoft Entra ID and IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/azure-ad-idp.html).

## Configure Microsoft Word extension access
<a name="configure-word-extension"></a>

As an administrator, you must allow the Amazon Quick Microsoft Word Extension to connect to your Amazon Quick application environment and web experience. You can use the Amazon Quick console to manage extension access configurations.

### User attribute mapping
<a name="word-user-attributes"></a>

When you configure a Microsoft Word extension, user identity is mapped by default using the following attributes:
+ **Amazon Quick user attribute** - Email address is used to map Amazon Quick users to their corresponding Microsoft 365 accounts. The system uses the email address to establish the connection between user identities.
+ **M365 Office add-in user attribute** - User Principal Name (UPN) is used to match against Microsoft 365 user accounts. Users need to use the User Principal Name (UPN) to sign in to Microsoft 365. Email address that works on both cloud and on-premise systems.

These default mappings ensure secure and accurate user identification across both platforms without requiring additional configuration.

**Topics**
+ [User attribute mapping](#word-user-attributes)
+ [Add Microsoft Word extension access for accounts using IAM Identity Center](#add-word-extension-access-idc)
+ [Add Microsoft Word extension access for accounts using other authentication methods](#add-word-extension-access)
+ [Edit Microsoft Word extension access](#edit-word-extension-access)
+ [Delete Microsoft Word extension access](#delete-word-extension-access)

### Add Microsoft Word extension access for accounts using IAM Identity Center
<a name="add-word-extension-access-idc"></a>

Configuring extension access with IAM Identity Center requires completing steps specific to your identity provider (Entra ID or Okta) followed by common setup steps in AWS.

#### Configure IAM Identity Center with Entra ID
<a name="configure-idc-entra-id"></a>

Follow these steps only if you are using IAM Identity Center with Entra ID to set up and configure an Azure tenant on your Microsoft Azure portal:

**To set up an Azure tenant**

1. In the Azure account, create a new app registration.

   1. Go to **App registrations**.

   1. In the **App registrations** screen, choose **New registration**. Under the **Supported account types** option, choose **Accounts in this organizational directory only (Personal use only - Single tenant)**. Once finished, choose **Register**.

   1. Note the client ID. You will need this later.

   1. Create a client secret for the app registration and keep note of it. You will need this later.

1. Add callback URLs for each Region in which your Word extension will be installed.

   1. Navigate to the app registration's **Authentication** tab.

   1. Choose **Platform Configurations**, **Add a platform**.

   1. Choose **Web**.

   1. Compose a callback URL using the following format, replacing *your-region* with your Amazon Quick instance Region. The Word extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Insert the callback URL as the redirect URI and choose **Configure** when done.

Follow these steps to configure a Trusted Token Issuer on your IAM Identity Center instance in your AWS Console:

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings**, **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *Tenant ID* refers to your Entra tenant ID:

   ```
   login.microsoftonline.com/Tenant ID/v2.0
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Entra ID-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-word) section below.

#### Configure IAM Identity Center with Okta
<a name="configure-idc-okta"></a>

Follow these steps only if you are using IAM Identity Center with Okta to set up and configure your App Integration in the Okta Admin console:

**To set up an Okta Application**

1. In your Okta account, create a new Okta App Integration.

   1. In your Okta Admin console, navigate to **Applications** > **Applications**.

   1. Click on **Create App Integration**.

   1. For the Sign-in method, select **OIDC - OpenID Connect**.

   1. For the Application type, select **Web Application**.

   1. Click on **Next**.

   1. Provide an App integration name.

   1. Under **Grant type** > **Core grants**, ensure **Authorization Code** and **Refresh Token** are selected.

   1. Under **Grant type** > **Advanced** > **Other grants**, ensure **Implicit (hybrid)** is selected.

1. Add callback URIs for each Region in which your Word extension will be installed

   1. Compose a callback URI using the following format, replacing *your-region* with your Amazon Quick instance Region for each region where you wish to configure the extension. The Word extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Under **Sign-in redirect URIs**, click on **Add URI** and paste each of the URIs you generated from the previous step.

1. Provide your organization access to the app:

   1. Under **Assignments** > **Controlled access**, select the groups in your organization that need to have access.

   1. Under **Assignments** > **Enable immediate access**, select **Enable immediate access with Federation Broker Mode**.

   1. Click on **Save**.

1. Note down the **Client ID** and **Client Secret** for the app integration you just created. You will need this in the next steps.

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings** > **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *yourOktaDomain* refers to the okta URL for your organization, which may look like `your-organization.okta.com`:

   ```
   https://{yourOktaDomain}/oauth2/default
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Okta-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-word) section below.

#### Complete AWS Configuration (all providers)
<a name="complete-aws-config-word"></a>

Follow these steps to set up permissions on AWS Console:

**To set up permissions**

1. Navigate to Secrets Manager on AWS console.

1. Choose **Store a new secret**.

1. Choose **Other type of secret** and choose the **Plaintext** tab.

1. Your secret should be in the following format and use the app registration client ID and app registration client secret that you saved from the earlier steps:

   ```
   {
   "client_id":"Your app registration client ID",
   "client_secret":"Your app registration client secret"
   }
   ```

1. Navigate to the secret you just created and save the ARN for later.

1. Now navigate to IAM on AWS console.

1. Choose **Access Management**, **Roles** in the left navigation bar.

1. Choose **Create role**.

1. Choose **Custom trust policy**.

1. Configure the role to trust our service principal for the relevant Region that you selected when configuring your identity provider app integration by adding the following statement replacing *your-region* with the Region you chose when creating your identity provider app integration:

   ```
   {
   "Version": "2012-10-17", 		 	 	 
   "Statement": [
   {
       "Effect": "Allow",
       "Principal": {
           "Service": "your-region.prod.appintegrations.plato.aws.internal"
       },
       "Action": "sts:AssumeRole",
       "Condition": {}
   }
   ]
   }
   ```

1. Choose **Next**.

1. Provide a name and description and choose **Create role**.

1. Navigate to the role you just created and choose it.

1. Choose **Add Permissions**, **Create inline policy**.

1. Choose **JSON**.

1. Configure the role with permissions to read secrets from Secrets Manager and permissions to invoke `sso:DescribeTrustedTokenIssuer` by adding the following statement:

   ```
   {
   "Version": "2012-10-17", 		 	 	 
   "Statement": [
   {
       "Sid": "BasePermissions",
       "Effect": "Allow",
       "Action": [
           "secretsmanager:GetSecretValue",
           "sso:DescribeTrustedTokenIssuer"
       ],
       "Resource": "*"
   }
   ]
   }
   ```

1. Provide a policy name and choose **Create policy**.

1. Copy and save the ARN of the IAM role you created for later. You will need it in the next steps.

Now you can follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Word environment:

**To create an extension access configuration**

1. Sign in to the Amazon Quick console.

1. In the top right, choose the profile picture icon.

1. From the drop-down menu, choose **Manage account**.

1. Under **Permissions**, choose **Extension access**.

1. In the top right, choose **New extension access**.

1. If this is your first time setting up extension access, you are prompted to complete the **Trusted Token Issuer Setup**. Configure the following fields and then choose **Next**:
   + **Trusted Token Issuer ARN** – Enter the trusted token issuer ARN that you noted from the earlier steps.
   + **Aud claim** – Enter the client ID from your app registration (Entra ID) or app integration (Okta) that you saved from the earlier steps.
**Note**  
This is a one-time setup that establishes a trusted identity source for all extensions. Once completed, you won't need to do this again for other extension accesses.

1. Select **Microsoft Word**. Then, choose **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Word extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description (optional)** - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).
   + **Secrets Role ARN** - Paste the ARN of the IAM role you created from the previous steps.
   + **Secrets ARN** - Paste the ARN of the Secrets Manager secret you created from the previous steps.

1. Choose **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, choose **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Microsoft Word environment.

**Note**  
For your end users to begin using your Microsoft Word extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see Installing your Microsoft Word extension in the Microsoft Word extension author guide.

### Add Microsoft Word extension access for accounts using other authentication methods
<a name="add-word-extension-access"></a>

Follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Word environment.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. In the top right, select **New extension access**.

1. Select **Microsoft Word**. Then, select **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Word extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description** (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).

1. Select **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, select **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Microsoft Word environment.

**Note**  
For your end users to begin using your Microsoft Word extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see [Installing your Microsoft Word extension in the Microsoft Word extension author guide](https://docs.aws.amazon.com/quicksuite/latest/userguide/word-extension-author-guide.html#add-extensions-word).

### Edit Microsoft Word extension access
<a name="edit-word-extension-access"></a>

Use these steps to modify the configuration settings of an existing Microsoft Word extension access.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the **Microsoft Word** extension you need to edit.

1. Select **Edit**.

1. Edit the configuration as required and select **Save** to confirm the changes.

Your changes to the Microsoft Word extension access configuration are saved and will take effect immediately.

### Delete Microsoft Word extension access
<a name="delete-word-extension-access"></a>

Follow these steps to permanently remove a Microsoft Word extension access configuration. This action cannot be undone.

**Note**  
Deleting a extension access removes access for all users in your M365 tenant and deletes all extensions created for Word.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Microsoft Word Extension you need to delete.

1. Select **Delete**.

1. Enter the word, "confirm", and select **DELETE**.

**Note**  
If the process to delete extension access fails, the admin must switch to the author view and delete the Word extensions that are using the configured extension access before returning to delete the extension access.

With Microsoft Word extension access configured, your team can now use Amazon Quick to enhance their document creation workflows with AI assistance for reviewing, drafting, revising, and accessing organizational knowledge directly within Word.

# Amazon Quick Microsoft Teams extension
<a name="teams-extension"></a>

The Quick extension for Microsoft Teams integrates AI-powered assistance directly into your team communication workflows. Users can mention @Amazon Quick in conversations to access company knowledge, use configured action connectors, and get contextual assistance without leaving their Teams environment.

The Teams extension enables users to:
+ Mention **@Amazon Quick** in conversations in Teams channels to add it as a collaborator.
+ Use actions from action connectors configured in Amazon Quick.
+ Access any company knowledge sources added to your Amazon Quick instance from within Microsoft Teams.

**Important**  
The Amazon Quick customer integrating Microsoft Teams must have a paid Microsoft Teams organization with an *M365 subscription for their organization*.
Amazon Quick does not use your user data for service improvement or for training its underlying large language models (LLMs).

**Topics**
+ [Prerequisites for Microsoft Teams extension](#teams-prerequisites)
+ [Configure Microsoft Teams extension access](#configure-teams-extension)

## Prerequisites for Microsoft Teams extension
<a name="teams-prerequisites"></a>

Before configuring access for the Amazon Quick extension to Microsoft Teams, administrators must complete the following steps:

1. Have a Microsoft 365 Business subscription and be a Global Admin or have administrative permissions (specifically `AppCatalog.ReadWrite.All`).

1. Have a Amazon Quick instance.

1. Your Microsoft 365 tenant ID. You can find this by going to the Azure portal > **Azure Active Directory** > **Properties**, or by using PowerShell. For detailed steps, see [How to find your tenant ID - Microsoft Entra](https://learn.microsoft.com/en-us/entra/fundamentals/how-to-find-tenant) in the Microsoft Learn portal.

If you configured the authentication to connect to Amazon Quick with IAM Identity Center, complete the following additional steps:

1. Ensure you have an IAM Identity Center instance enabled on your AWS account.

1. If you are connecting an external IAM provider to IAM Identity Center, ensure that every user under your IAM provider configuration has an email associated with them.

1. If you are using Entra ID, set up SCIM identity propagation between the Microsoft Entra ID instance and IAM Identity Center. For detailed steps, see [Configure SAML and SCIM with Microsoft Entra ID and IAM Identity Center](https://docs.aws.amazon.com/singlesignon/latest/userguide/azure-ad-idp.html).

## Configure Microsoft Teams extension access
<a name="configure-teams-extension"></a>

As an administrator, you must allow the Amazon Quick Microsoft Teams to connect to your Amazon Quick application environment. You can use the Amazon Quick console to manage extension access configurations.

### User attribute mapping
<a name="teams-user-attributes"></a>

When you configure a Microsoft Teams extension, user identity is mapped by default using the following attributes:
+ **Amazon Quick user attribute** - Email address is used to map Amazon Quick users to their corresponding Microsoft 365 accounts. The system uses the email address to establish the connection between user identities.
+ **M365 Office add-in user attribute** - User Principal Name (UPN) is used to match against Microsoft 365 user accounts. Users need to use the User Principal Name (UPN) to sign in to Microsoft 365. Email address that works on both cloud and on-premise systems.

These default mappings ensure secure and accurate user identification across both platforms without requiring additional configuration.

**Topics**
+ [User attribute mapping](#teams-user-attributes)
+ [Add Microsoft Teams extension access for accounts using IAM Identity Center](#add-teams-extension-access-idc)
+ [Add Microsoft Teams extension access for accounts using other authentication methods](#add-teams-extension-access)
+ [Edit Microsoft Teams extension access](#edit-teams-extension-access)
+ [Delete Microsoft Teams extension access](#delete-teams-extension-access)

### Add Microsoft Teams extension access for accounts using IAM Identity Center
<a name="add-teams-extension-access-idc"></a>

Configuring extension access with IAM Identity Center requires completing steps specific to your identity provider (for example, Entra ID or Okta) followed by common setup steps in AWS.

#### Configure IAM Identity Center with Entra ID
<a name="configure-idc-entra-id"></a>

Follow these steps only if you are using IAM Identity Center with Entra ID to set up and configure an Azure tenant on your Microsoft Azure portal:

**To set up an Azure tenant**

1. In the Azure account, create a new app registration.

   1. Go to **App registrations**.

   1. In the **App registrations** screen, choose **New registration**. Under the **Supported account types** option, choose **Accounts in this organizational directory only (Personal use only - Single tenant)**. Once finished, choose **Register**.

   1. Note the client ID. You will need this later.

   1. Create a client secret for the app registration. Copy and save the secret's **Value** attribute. You need it later. This value is only shown once and cannot be retrieved after you leave the page.

1. Add callback URLs for each Region in which your Teams extension will be installed.

   1. Navigate to the app registration's **Authentication** tab.

   1. Choose **Platform Configurations**, **Add a platform**.

   1. Choose **Web**.

   1. Compose a callback URL using the following format, replacing *your-region* with your Amazon Quick instance Region. The Teams extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Insert the callback URL as the redirect URI and choose **Configure** when done.

Follow these steps to configure a Trusted Token Issuer on your IAM Identity Center instance in your AWS Console:

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings**, **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *Tenant ID* refers to your Entra tenant ID:

   ```
   login.microsoftonline.com/Tenant ID/v2.0
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Entra ID-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-teams) section below.

#### Configure IAM Identity Center with Okta
<a name="configure-idc-okta"></a>

Follow these steps only if you are using IAM Identity Center with Okta to set up and configure your App Integration in the Okta Admin console:

**To set up an Okta Application**

1. In your Okta account, create a new Okta App Integration.

   1. In your Okta Admin console, navigate to **Applications** > **Applications**.

   1. Click on **Create App Integration**.

   1. For the Sign-in method, select **OIDC - OpenID Connect**.

   1. For the Application type, select **Web Application**.

   1. Click on **Next**.

   1. Provide an App integration name.

   1. Under **Grant type** > **Core grants**, ensure **Authorization Code** and **Refresh Token** are selected.

   1. Under **Grant type** > **Advanced** > **Other grants**, ensure **Implicit (hybrid)** is selected.

1. Add callback URIs for each Region in which your Teams extension will be installed

   1. Compose a callback URI using the following format, replacing *your-region* with your Amazon Quick instance Region for each region where you wish to configure the extension. The Teams extension supports the following Regions: `ap-southeast-2`, `eu-west-1`, `us-west-2`, and `us-east-1`.

      ```
      qbs-cell001.dp.appintegrations.your-region.prod.plato.ai.aws.dev/auth/idc-tti/callback
      ```

   1. Under **Sign-in redirect URIs**, click on **Add URI** and paste each of the URIs you generated from the previous step.

1. Provide your organization access to the app:

   1. Under **Assignments** > **Controlled access**, select the groups in your organization that need to have access.

   1. Under **Assignments** > **Enable immediate access**, select **Enable immediate access with Federation Broker Mode**.

   1. Click on **Save**.

1. Note down the **Client ID** and **Client Secret** for the app integration you just created. You will need this in the next steps.

**To configure a Trusted Token Issuer**

1. Go to your AWS account and navigate to your IAM Identity Center instance.

1. Navigate to **Settings** > **Authentication**.

1. Choose **Create trusted token issuer**.

1. Add the issuer URL, which should follow this template, where *yourOktaDomain* refers to the okta URL for your organization, which may look like `your-organization.okta.com`:

   ```
   https://{yourOktaDomain}/oauth2/default
   ```
**Note**  
The issuer URL should be the OIDC discovery endpoint of your identity without the well-known document URI path. If you include the well-known document URI path, this will not work. See Trusted token issuer configuration settings.

1. Choose **Email** as the Identity Provider attribute and IAM Identity Center attribute.

1. Note the trusted token issuer ARN. You will need this in a later step.

After completing these Okta-specific steps, proceed to the [Complete AWS Configuration (all providers)](#complete-aws-config-teams) section below.

#### Complete AWS Configuration (all providers)
<a name="complete-aws-config-teams"></a>

Follow these steps to set up permissions on AWS Console:

**To set up permissions**

1. Navigate to Secrets Manager on AWS console.

1. Choose **Store a new secret**.

1. Choose **Other type of secret** and choose the **Plaintext** tab.

1. Your secret should be in the following format and use the app registration client ID and app registration client secret that you saved from the earlier steps:

   ```
   {
   "client_id":"Your app registration client ID",
   "client_secret":"Your app registration client secret value"
   }
   ```

1. Navigate to the secret you just created and save the ARN for later.

1. Now navigate to IAM on AWS console.

1. Choose **Access Management**, **Roles** in the left navigation bar.

1. Choose **Create role**.

1. Choose **Custom trust policy**.

1. Configure the role to trust our service principal for the relevant Region that you selected when configuring your identity provider app integration by adding the following statement replacing *your-region* with the Region you chose when creating your identity provider app integration:

   ```
   {
   "Version": "2012-10-17", 		 	 	 
   "Statement": [
   {
       "Effect": "Allow",
       "Principal": {
           "Service": "your-region.prod.appintegrations.plato.aws.internal"
       },
       "Action": "sts:AssumeRole",
       "Condition": {}
   }
   ]
   }
   ```

1. Choose **Next**.

1. Provide a name and description and choose **Create role**.

1. Navigate to the role you just created and choose it.

1. Choose **Add Permissions**, **Create inline policy**.

1. Choose **JSON**.

1. Configure the role with permissions to read secrets from Secrets Manager and permissions to invoke `sso:DescribeTrustedTokenIssuer` by adding the following statement:

   ```
   {
   "Version": "2012-10-17", 		 	 	 
   "Statement": [
   {
       "Sid": "BasePermissions",
       "Effect": "Allow",
       "Action": [
           "secretsmanager:GetSecretValue",
           "sso:DescribeTrustedTokenIssuer"
       ],
       "Resource": "*"
   }
   ]
   }
   ```

1. Provide a policy name and choose **Create policy**.

1. Copy and save the ARN of the IAM role you created for later. You will need it in the next steps.

Now you can follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Teams environment:

**To create an extension access configuration**

1. Sign in to the Amazon Quick console.

1. In the top right, choose the profile picture icon.

1. From the drop-down menu, choose **Manage account**.

1. Under **Permissions**, choose **Extension access**.

1. In the top right, choose **New extension access**.

1. If this is your first time setting up extension access, you are prompted to complete the **Trusted Token Issuer Setup**. Configure the following fields and then choose **Next**:
   + **Trusted Token Issuer ARN** – Enter the trusted token issuer ARN that you noted from the earlier steps.
   + **Aud claim** – Enter the client ID from your app registration (Entra ID) or app integration (Okta) that you saved from the earlier steps.
**Note**  
This is a one-time setup that establishes a trusted identity source for all extensions. Once completed, you won't need to do this again for other extension accesses.

1. Select **Microsoft Teams**. Then, choose **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Teams extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description (optional)** - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).
   + **Secrets Role ARN** - Paste the ARN of the IAM role you created from the previous steps.
   + **Secrets ARN** - Paste the ARN of the Secrets Manager secret you created from the previous steps.

1. Choose **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, choose **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admin in your organization to create and deploy Amazon Quick extensions within your Microsoft Teams environment.

**Note**  
For your end users to begin using your Microsoft Teams extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see Installing your Microsoft Teams extension in the Microsoft Teams extension author guide.

### Add Microsoft Teams extension access for accounts using other authentication methods
<a name="add-teams-extension-access"></a>

Follow these steps to create a new extension access configuration that will allow Amazon Quick to integrate with your Microsoft Teams environment.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. In the top right, select **New extension access**.

1. Select **Microsoft Teams**, then, **Next**.

1. Configure the following fields:
   + **Name** - A name for your extension is pre-filled for you. You can edit this and enter a descriptive name for the Teams extension (maximum 512 alphanumeric characters, hyphens allowed but no spaces).
   + **Description** (optional) - A description for your extension is pre-filled for you. You can edit this and enter a new description to provide additional context about this extension configuration (maximum 1000 characters).
   + **M365 tenant ID** - Enter your Microsoft 365 tenant identifier (must be 36 characters).

1. Select **Add** to save the new access configuration.

   A success message will open up on the top right of your screen.

1. From the success message, select **View extensions** to finish installing your extension.
**Note**  
You can also navigate to the installation screen from **Connections** > **Extensions** in the Amazon Quick menu.

Once created, this extension access configuration enables authors and other admins in your organization to deploy your Microsoft Teams Amazon Quick extension within your Microsoft Teams environment.

**Note**  
For your end users to begin using your Microsoft Teams extension, an admin or author must finish deploying a extension after you configure extension access. Notify your authors that they can view, edit, and complete installation of this extension under **Extensions** in the left navigation once it has been shared. To learn how to do this see [Installing your Microsoft Teams extension in the Microsoft Teams extension author guide](https://docs.aws.amazon.com/quicksuite/latest/userguide/teams-extension-author-guide.html#add-extensions-teams).

### Edit Microsoft Teams extension access
<a name="edit-teams-extension-access"></a>

Use these steps to modify the configuration settings of an existing Microsoft Teams extension access.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Microsoft Teams extension you need to edit.

1. Select **Edit**.

1. Edit the configuration as required and select **Save** to confirm the changes.

Your changes to the Microsoft Teams extension access configuration are saved and will take effect immediately.

### Delete Microsoft Teams extension access
<a name="delete-teams-extension-access"></a>

Follow these steps to permanently remove a Microsoft Teams extension access configuration. This action cannot be undone.

1. Sign in to the Amazon Quick console.

1. In the top right, select the profile picture icon.

1. From the drop-down menu, select **Manage account**.

1. Under **Permissions**, select **Extension access**.

1. Select the three dot menu icon for the Microsoft Teams Extension you need to delete.

1. Select **Delete**.

1. Enter the word, "confirm", and select **DELETE**.

**Note**  
Deleting a extension access removes access for all users in your M365 tenant and deletes all extensions created for Teams. If delete extension access fails, the admin must switch to the author view and delete the Teams extensions that are using the configured extension access before returning to delete the extension access. 

With Microsoft Teams extension access configured, your team can now use **@Quick** mentions in conversations to access AI assistance, company knowledge, and action connectors directly within their Teams environment.