Vocab
- User Pool: User directory for managing user-identity mapping.
- Identity Pool: Identity directory for managing identity-permissions mapping.
- STS: Security Token Service allows users to request temporary limited-access credentials to users.
Design Details
We can authenticate a user through any OIDC provider. Said providers give us a signed JWT certifying the users identity. But how do you manage what actions this identity can perform? You could roll your own backend logic/middleware for determining this or you could use Cognito’s identity pool to map identities to corresponding IAM roles with granular policies for when the identity is authenticated or when they are not. We can specify unique roles for authenticated or unauthenticated identities as Identity Pools build unique identifiers and AWS credentials for users who don’t authenticate by default. Every identity is either authenticated or unauthenticated, and we attach an IAM Policy to each type.
Identity Pool Authentication Flow
sequenceDiagram participant U as User participant UP as Cognito User Pool participant IP as Cognito Identity Pool participant IDP as Identity Provider participant STS as AWS STS participant R as AWS Resources U->>UP: Sign up UP->>IP: Provision user (if identity provider) U->>IDP: Obtain tokens U->>IP: Exchange tokens for creds IP->>STS: Obtain temporary creds STS->>IP: Provide creds U->>R: Make requests using creds
Expanding on the second (more common in AWS) flow: Users sign up by creating an entry in the AWS Cognito User Pool. If the User Pool is configured as an identity provider for the Cognito Identity Pool, creating a user in the User Pool automatically provisions an entry in the Identity Pool. Authenticated and guest IAM roles are defined and attached to the Identity Pool, providing credentials for users authenticated via an identity provider or anonymous users. Users can give the tokens from their identity providers to our identity pool to obtain temporary security credentials from AWSSTS, allowing them to make requests with permissions based on their assigned roles.
Pricing (first 10,000 MAU free)
- Essentials(Default): $0.015 / MAU
- Lite: 0.0025 depending on MAU
Amplify’s Interface
Frontend
useUser Hook
Backend
on the backend side, its super easy to set up your cognito user pool and idenity pool with amplify. use defineAuth
method from @aws-amplify/backend
and configure it by providing it a json object with ur settings:
import { defineAuth, secret } from '@aws-amplify/backend';
export const auth = defineAuth({
loginWith: {
email: true,
phone: true,
groups: ["ADMINS", "EDITORS"]
externalProviders: {
google: {
clientId: secret('GOOGLE_CLIENT_ID'),
clientSecret: secret('GOOGLE_CLIENT_SECRET')
},
signInWithApple: {
clientId: secret('SIWA_CLIENT_ID'),
keyId: secret('SIWA_KEY_ID'),
privateKey: secret('SIWA_PRIVATE_KEY'),
teamId: secret('SIWA_TEAM_ID')
},
loginWithAmazon: {
clientId: secret('LOGINWITHAMAZON_CLIENT_ID'),
clientSecret: secret('LOGINWITHAMAZON_CLIENT_SECRET')
},
facebook: {
clientId: secret('FACEBOOK_CLIENT_ID'),
clientSecret: secret('FACEBOOK_CLIENT_SECRET') },
callbackUrls: [ 'http://localhost:3000/profile', 'https://mywebsite.com/profile' ],
logoutUrls: ['http://localhost:3000/', 'https://mywebsite.com'],
}
},
userAttributes: {
prefferedUsername: {
mutable: true,
required: false,
},
birthdate: {
mutable: true,
required: false,
},
"custom:is_beta_usesr": {
dataType: "Boolean",
mutable: true,
}
}
});