amazon-cognito

Forgot password link from aws cognito

杀马特。学长 韩版系。学妹 提交于 2019-12-04 04:38:41
I started exploring AWS cognito for my dummy ios application, although I am getting a confirmation link in email during new user signup, and clicking on it verifies the email correctly. Do we have same functionality for forgot password i.e. getting a link instead of codes and redirect it to my dummy website where only thing user needs to do is enter is new password. Thanks in advance. Mayur Shingare Its possible I have achieved this in my project. Its done via triggers in aws cognito. In Custom message trigger set lambda function you want to trigger. const AWS = require('aws-sdk'); exports

AWS Lambda can't call Cognito Identity - IAM Role

做~自己de王妃 提交于 2019-12-04 03:38:40
问题 I've got a bit of javascript which runs on my local machine but doesn't work from within the Lambda. It timeouts when calling cognitoidentity.getOpenIdTokenForDeveloperIdentity { "errorMessage": "2016-03-17T16:50:25.181Z 4fa3fa5a-ec60-11e5-8316-415fa39313da Task timed out after 15.00 seconds" } On local it works fine (calling into AWS production services) so it must be the policy I have attached to the Lambda. Here are the policies I have: AmazonCognitoDeveloperAuthenticatedIdentities

How to restore an expired token [AWS Cognito]?

∥☆過路亽.° 提交于 2019-12-04 03:14:20
I'm using AWS for my website. After 1 hour the token expires and the user pretty much can't do anything. For now i'm trying to refresh the credentials like this: function getTokens(session) { return { accessToken: session.getAccessToken().getJwtToken(), idToken: session.getIdToken().getJwtToken(), refreshToken: session.getRefreshToken().getToken() }; }; function getCognitoIdentityCredentials(tokens) { const loginInfo = {}; loginInfo[`cognito-idp.eu-central-1.amazonaws.com/eu-central-1_XXX`] = tokens.idToken; const params = { IdentityPoolId: AWSConfiguration.IdPoolId Logins: loginInfo }; return

AWS Cognito Sign-In (Android)

五迷三道 提交于 2019-12-04 01:56:14
问题 I am trying to figure out how to sign in a User with AWS Cognito. The tutorials all seem to deal with Users from a standpoint of signing up Users, not signing them in. I do not want the users to go through a sign-up process; that will be done elsewhere, by our office users. I just want to have, in this app, a flow that has them enter their existing username and password and sign in. My current understanding of things is that Cognito User Pools only supports either sign-in using an

AWS Cognito sign in not working (Swift-iOS)

妖精的绣舞 提交于 2019-12-03 20:56:41
I've integrated cognito into my xcode project. The sign up/password update features are working correctly. However I can't seem to get the sign in process to work. I turned on the logs and I get the following error {"__type":"NotAuthorizedException","message":"Access Token has expired"} Domain=com.amazonaws.AWSCognitoIdentityProviderErrorDomain Code=-1000 "Authentication delegate not set" UserInfo={NSLocalizedDescription=Authentication delegate not set}] I have also implemented the AWSCognitoIdentityInteractiveAuthenticationDelegate delegate in the AppDelegate script. Here's the AppDelegate

How to redirect after confirm amazon cognito using confirmation URL?

此生再无相见时 提交于 2019-12-03 18:58:31
问题 I want to redirect to a specific url after the user confirmation in amazon cognito. When a user sign up he will get confirmation mail with a verification link as follows https://<>.auth.us-west-2.amazoncognito.com/confirmUser?client_id=<<>>&user_name=<<>>&confirmation_code=<<>> If the user clicks the above link it will redirect to confirmation page. Once the user confirmation is completed the page should redirect to my application. Please give me some idea to solve this problem. 回答1:

How to validate AWS Cognito JWT in .NET Core Web API using .AddJwtBearer()

瘦欲@ 提交于 2019-12-03 16:35:35
I was having some trouble figuring out how to go about validating a JWT given to the client by AWS Cognito inside my .NET Core Web API. Not only could I not figure out what the variables for Microsoft.IdentityModel.Tokens.TokenValidationParameters were supposed to be, but once I finally did, I didn't know how to retrieve the JWT key set from https://cognito-idp.{region}.amazonaws.com/{pool ID}/.well-known/jwks.json Finally, though a lot of random Googling and trial and error, I found a (seemingly-not-very-efficient solution) solution. However, I spent way too much time doing it. Citing that,

Can I authenticate with AWS Cognito from plain Java?

让人想犯罪 __ 提交于 2019-12-03 16:30:36
I want to test custom user authorization with Cognito and do it from a simple java code. The problem is, the CognitoCachingCredentialsProvider requires an Android ApplicationContext and won't accept a null. The whole flow is supposed to go like this: User logs in using an email and password Backend (a Lambda function) gets an IdentityToken from Cognito and returns it to the user User can now retrieve credentials from Cognito and initialize an ApiClientFactory to authorize calls to other API endpoints Is there something I'm missing or do I just have the whole concept wrong? Any good tutorials

Cognito/IAM Policies & S3 Get Object

本小妞迷上赌 提交于 2019-12-03 16:13:26
I'm trying to integrate S3 and Cognito into my iOS App, so far not successfully. I believe the error is connected to my IAM Policy for Auth and Unauth users. So here's my policy: { "Version": "2012-10-17", "Statement": [{ "Effect":"Allow", "Action":"cognito-sync:*", "Resource":["arn:aws:cognito-sync:us-east-1:XXXXXXXXXXXX:identitypool/${cognito-identity.amazonaws.com:aud}/identity/${cognito-identity.amazonaws.com:sub}/*"] }, { "Effect":"Allow", "Action": "s3:*", "Resource": ["arn:aws:s3:::my_bucket", "arn:aws:s3:::my_bucket/*"] } ] } here is where I call S3: AWSS3GetObjectRequest

AWS API Gateway - using Access Token with Cognito User Pool authorizer?

删除回忆录丶 提交于 2019-12-03 14:41:14
I am configuring an app with various frontends (mobile and web apps) and a single API backend, powered by Lambda and accessed via AWS API Gateway. As I'm planning to use Cognito to authenticate and authorize users, I have set up a Cognito User Pool authorizer on my API Gateway and several API methods. With an architecture like this, it seems logical that my apps (e.g. an iOS or Vue.js app) are the Client applications from an OAuth perspective, and my API Gateway backend is a Resource Server. Based on this Auth0 forum post it seems clear that I should therefore use an ID token in my client app,