amazon-cognito

Listing users and their groups from AWS.CognitoIdentityServiceProvider.listUsers in a NodeJS Lambda function?

白昼怎懂夜的黑 提交于 2021-01-05 06:55:35
问题 So I need to display a list of users as well as their individual groups in a custom admin screen for a client. I'm returning the results of AWS.CognitoIdentityServiceProvider.listUsers in a Lambda function and that's listing users fine, but I'm not sure on the best way to fetch the groups for each user and add them to the response. It seems a bit surprising to me that they don't provide a listUsers like method that includes that information, personally, as it seems like it would be a common

Listing users and their groups from AWS.CognitoIdentityServiceProvider.listUsers in a NodeJS Lambda function?

我的未来我决定 提交于 2021-01-05 06:54:57
问题 So I need to display a list of users as well as their individual groups in a custom admin screen for a client. I'm returning the results of AWS.CognitoIdentityServiceProvider.listUsers in a Lambda function and that's listing users fine, but I'm not sure on the best way to fetch the groups for each user and add them to the response. It seems a bit surprising to me that they don't provide a listUsers like method that includes that information, personally, as it seems like it would be a common

Listing users and their groups from AWS.CognitoIdentityServiceProvider.listUsers in a NodeJS Lambda function?

佐手、 提交于 2021-01-05 06:54:20
问题 So I need to display a list of users as well as their individual groups in a custom admin screen for a client. I'm returning the results of AWS.CognitoIdentityServiceProvider.listUsers in a Lambda function and that's listing users fine, but I'm not sure on the best way to fetch the groups for each user and add them to the response. It seems a bit surprising to me that they don't provide a listUsers like method that includes that information, personally, as it seems like it would be a common

AWS Cognito hosted UI and Amplify Auth with authorization code OAuth flow

不打扰是莪最后的温柔 提交于 2021-01-03 04:15:46
问题 I have a Vue.js webapp that I am trying to add simple authentication to using AWS Cognito and Amplify Auth. I have my user pool set up with "Authorization code grant" enabled for the OAuth flow. I also have the redirect URL set as https://example.auth.us-east-2.amazoncognito.com/login?response_type=code&client_id=XXXXXXXX&redirect_uri=https://example.com/auth/verify for the hosted UI. This is what's within the page the hosted UI redirects to: import { Auth } from "aws-amplify"; export default

AWS Cognito hosted UI and Amplify Auth with authorization code OAuth flow

谁都会走 提交于 2021-01-03 04:14:25
问题 I have a Vue.js webapp that I am trying to add simple authentication to using AWS Cognito and Amplify Auth. I have my user pool set up with "Authorization code grant" enabled for the OAuth flow. I also have the redirect URL set as https://example.auth.us-east-2.amazoncognito.com/login?response_type=code&client_id=XXXXXXXX&redirect_uri=https://example.com/auth/verify for the hosted UI. This is what's within the page the hosted UI redirects to: import { Auth } from "aws-amplify"; export default

AWS Cognito hosted UI and Amplify Auth with authorization code OAuth flow

江枫思渺然 提交于 2021-01-03 04:14:13
问题 I have a Vue.js webapp that I am trying to add simple authentication to using AWS Cognito and Amplify Auth. I have my user pool set up with "Authorization code grant" enabled for the OAuth flow. I also have the redirect URL set as https://example.auth.us-east-2.amazoncognito.com/login?response_type=code&client_id=XXXXXXXX&redirect_uri=https://example.com/auth/verify for the hosted UI. This is what's within the page the hosted UI redirects to: import { Auth } from "aws-amplify"; export default

Can a cognito user pool use SES with a verified domain and not a verified email?

…衆ロ難τιáo~ 提交于 2020-12-30 08:53:45
问题 Cognito's User Pool takes an email config that needs an ARN of a verified email. Can I use any email on a verified domain instead of a single verified email? https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-email.html I am looking at this documentation, but I am not sure how to make a User pool with anything other than a "verified email" which is not automatable. the alternative that i would like is to automate the verification of a domain and then use any address from that

How to check Email Already exists in AWS Cognito?

纵饮孤独 提交于 2020-12-30 08:26:05
问题 I am using AWS Cognito for signin/signup. We have two step from. 1) It will ask for email. 2) If email already exists then it will ask Password or otherwise it will say create password. Button on this step displayed based on the above condition either Login or Register. Here after user enters email, I need a way to check in cognito with AWS javascript SDK to check email already registered or not. Thanks, 回答1: Amazon Amplify makes the signIn and signUp process very straightforward with the

Integrate existing AWS Cognito user pool into iOS project with Amplify

六眼飞鱼酱① 提交于 2020-12-30 06:22:08
问题 I am trying to add AWS Cognito to my iOS application using AWS Amplify. The docs suggest to use amplify add auth on the CLI, but this does not seem to work with an existing User Pool (i.e. you have to create a new one). Is it possible to integrate AWS Cognito into my iOS (Swift) project using an existing User Pool ? 回答1: Amplify CLI doesn't support existing resources at the moment but you can manually edit your awsconfiguration.json to include the User Pool that is already present as outlined

Can't resend verification code through AWS Cognito API

本秂侑毒 提交于 2020-12-30 02:11:14
问题 I have an AWS Cognito User Pool where users are created through Cognito's API using the AdminCreateUser action, which works fine. This sends out a verification e-mail to the user, containing a temporary password. So far so good. Now a user did not receive this verification e-mail, so I need to send it again, using the ResendConfirmationCode action. I am attempting to do that with the below PHP code. $userPoolId = '[POOL_ID_HERE]'; $backendAppId = '[APP_ID_HERE]'; $clientSecret = '[SECRET_HERE