cloud:aws:cognito
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
cloud:aws:cognito [2018/08/09 10:09] – skipidar | cloud:aws:cognito [2023/11/01 07:13] (current) – ↷ Page moved from business_process_management:camunda:cloud:aws:cognito to cloud:aws:cognito skipidar | ||
---|---|---|---|
Line 1: | Line 1: | ||
===== Cognito ===== | ===== Cognito ===== | ||
- | |Identity Pool alias **Federated Identities**|< | + | |Cognito Identity|< |
+ | Behind the identity ther is a person. The identity is an abstraction of a login / userid, because the userid or login can come from different systems, like facebook, google etc. | ||
+ | </ | ||
+ | |Identity Pool alias **Federated Identities**|< | ||
Identity pools allow you to grant users authenticated by third parties (e.g. login with Google) temporary IAM credentials to use you AWS resources in a limited way. Identity pools are free of cost and you only pay for the resources your users use via the IAM credentials. | Identity pools allow you to grant users authenticated by third parties (e.g. login with Google) temporary IAM credentials to use you AWS resources in a limited way. Identity pools are free of cost and you only pay for the resources your users use via the IAM credentials. | ||
+ | |||
+ | See the federation tokes, which are given to users from "User pool" | ||
</ | </ | ||
- | |User pool|< | + | |User pool|< |
User pools allow you to store your own users, they can sign up directly to the user pool and not have to use a third party provider like Google or Facebook. | User pools allow you to store your own users, they can sign up directly to the user pool and not have to use a third party provider like Google or Facebook. | ||
Line 15: | Line 20: | ||
|Federation tokens|Are provided in the Identity pool. At the end, they are associated with an IAM role and get access to AWS resources | | |Federation tokens|Are provided in the Identity pool. At the end, they are associated with an IAM role and get access to AWS resources | | ||
|Federated Identities > [[https:// | |Federated Identities > [[https:// | ||
+ | | OpenID |< | ||
+ | About authentication. | ||
+ | </ | ||
+ | | Oauth 2.0|< | ||
+ | About authorization. | ||
+ | </ | ||
+ | | Token |< | ||
+ | This is a OpendId Connect compliant id token issued by Cognito Identity which asserts the users identity in a signed and verifiable way. Consider this token as a digital identity card which can be used by clients to verify the identity of users. You can refer to cognito API documentation for details on how to obtain this token and this documentation for more details on how to validate this token as a client. | ||
+ | </ | ||
+ | | SessionToken|< | ||
+ | This token is issued by the service as a descriptor of users AWS session along with the temporary AWS credentials. Cognito calls STS on your behalf and returns the temporary credentials returned. When using other AWS resources using the issued temporary credentials, | ||
+ | </ | ||
+ | | SyncSessionToken|< | ||
+ | Is an identitfier issued by Cognito Sync service after initializing a sync operation. This sync operation is used as a unit for Cognito sync pricing. A sync operation is marked complete when you perform a successful write/ | ||
+ | </ | ||
- | {{https:// | ||
- | ===Difference User Pools > Identity providers and Federated Identities > Authentication providers=== | + | {{https:// |
- | **Identity pools** (Federated identities) allow you to grant users authenticated by third parties (e.g. login with Google) temporary IAM credentials to use you AWS resources in a limited way. Identity pools are free of cost and you only pay for the resources your users use via the IAM credentials. | ||
- | User pools allow you to store your own users, they can sign up directly to the user pool and not have to use a third party provider like Google or Facebook. Confusingly user pools also have a ' |
cloud/aws/cognito.1533809390.txt.gz · Last modified: (external edit)