AWS Security Blog

Category: HAQM Cognito

How to use OAuth 2.0 in HAQM Cognito: Learn about the different OAuth 2.0 grants

Implementing authentication and authorization mechanisms in modern applications can be challenging, especially when dealing with various client types and use cases. As developers, we often struggle to choose the right authentication flow to balance security, user experience, and application requirements. This is where understanding the OAuth 2.0 grant types comes into play. Whether you’re building […]

HAQM Cognito

How to customize access tokens in HAQM Cognito user pools

January 28, 2025: The following blog post highlights how to customize access tokens in HAQM Cognito user pools. With the introduction of new Cognito user pool feature tiers, the access token customization feature is now available as part of the default feature set for Essentials and Plus feature tier customers, so customers don’t need to […]

Use private key JWT authentication between HAQM Cognito user pools and an OIDC IdP

With HAQM Cognito user pools, you can add user sign-up and sign-in features and control access to your web and mobile applications. You can enable your users who already have accounts with other identity providers (IdPs) to skip the sign-up step and sign in to your application by using an existing account through SAML 2.0 […]

Approaches for migrating users to HAQM Cognito user pools

Update: An earlier version of this post was published on September 14, 2017, on the Front-End Web and Mobile Blog. HAQM Cognito user pools offer a fully managed OpenID Connect (OIDC) identity provider so you can quickly add authentication and control access to your mobile app or web application. User pools scale to millions of […]

Scaling national identity schemes with itsme and HAQM Cognito

In this post, we demonstrate how you can use identity federation and integration between the identity provider itsme® and HAQM Cognito to quickly consume and build digital services for citizens on HAQM Web Services (AWS) using available national digital identities. We also provide code examples and integration proofs of concept to get you started quickly. […]

Example default hosted UI with several login providers enabled

Should I use the hosted UI or create a custom UI in HAQM Cognito?

September 8, 2023: It’s important to know that if you activate user sign-up in your user pool, anyone on the internet can sign up for an account and sign in to your apps. Don’t enable self-registration in your user pool unless you want to open your app to allow users to sign up. July 27, […]

Simplify web app authentication: A guide to AD FS federation with HAQM Cognito user pools

September 8, 2023: It’s important to know that if you activate user sign-up in your user pool, anyone on the internet can sign up for an account and sign in to your apps. Don’t enable self-registration in your user pool unless you want to open your app to allow users to sign up. August 13, […]

How to set up HAQM Cognito for federated authentication using Azure AD

September 8, 2023: It’s important to know that if you activate user sign-up in your user pool, anyone on the internet can sign up for an account and sign in to your apps. Don’t enable self-registration in your user pool unless you want to open your app to allow users to sign up. In this […]

Implement OAuth 2.0 device grant flow by using HAQM Cognito and AWS Lambda

In this blog post, you’ll learn how to implement the OAuth 2.0 device authorization grant flow for HAQM Cognito by using AWS Lambda and HAQM DynamoDB. When you implement the OAuth 2.0 authorization framework (RFC 6749) for internet-connected devices with limited input capabilities or that lack a user-friendly browser—such as wearables, smart assistants, video-streaming devices, […]

Access token security for microservice APIs on HAQM EKS

In this blog post, I demonstrate how to implement service-to-service authorization using OAuth 2.0 access tokens for microservice APIs hosted on HAQM Elastic Kubernetes Service (HAQM EKS). A common use case for OAuth 2.0 access tokens is to facilitate user authorization to a public facing application. Access tokens can also be used to identify and […]