Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Jul 10, 2024From Zero to Hero: Creating Secure Cognito Identity Pools Using Terraform Without Prior ExperienceIntroduction :- Welcome! If you’re eager to learn how to set up secure Cognito Identity Pools with Terraform but have no idea where to start, you’re in the right place. This document will guide you from knowing nothing about these technologies to set...DiscussCognito
Jayesh Rajputjayeshrajput.hashnode.dev·Jun 20, 2024A Beginner's Guide to Securing Apps with Amazon CognitoWhen building web applications, user authentication and authorization can be challenging. Amazon Cognito simplifies this process for developers by providing convenient sign-up, sign-in, and enhanced security functionalities. Amazon Cognito is a ful...Discuss·5 likesAWS
Sri Durgesh Vsridurgeshv.hashnode.dev·May 17, 2024Enhancing Security in Your E-Commerce Platform: Integrating AWS Cognito with Your React Application [Part - 1]Introduction: Welcome back to the journey of architecting the future of e-commerce. In this installment, we delve into the cornerstone of user trust and security: authentication. Join me as I explore the intricacies of implementing user authenticatio...Discuss·10 likes·32 readsAWS
Omid EidivandiforServerless Folks Blogsblogs.serverlessfolks.com·Apr 30, 2024Impersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The approach to security, both in mindset and execution, can differ depending on factors like the intended usage s...Discussserverless computing
Omid Eidivandiserverlessfolks.com·Apr 29, 2024Impersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The approach to security, both in mindset and execution, can differ depending on factors like the intended usage s...Discuss·101 readsAmazon Cognito
Raul NaupariProblog.raulnq.com·Apr 3, 2024How to Implement Authorization in .NET APIs with Amazon CognitoAuthorization is the process that determines what users can do after they are authenticated. In the .NET ecosystem, it's straightforward to implement the most common approaches, such as role-based access control (RBAC) or attribute-based access contr...Discuss·53 readsAWS
Raul NaupariProblog.raulnq.com·Mar 28, 2024Securing .NET APIs with Amazon CognitoIn this article, we delve into securing .NET APIs with Amazon Cognito, specifically focusing on ensuring authenticated users have the necessary permissions to access resources. Building on the foundation laid in the previous article, Amazon Cognito A...Discuss·26 reads.NET
Raul NaupariProblog.raulnq.com·Mar 17, 2024Authentication with Amazon Cognito and ASP.NET Core IdentityAmazon Cognito is an identity platform for web and mobile apps. It’s a user directory, an authentication server, and an authorization service for OAuth 2.0 access tokens and AWS credentials. With Amazon Cognito, you can authenticate and authorize use...Discuss·7 likes·170 reads.NET
Prudviprudvi.hashnode.dev·Jan 25, 2024What is Authentication?Authentication is important component of IAM. It’s the process of verifying identity of a user or a system. In simple words, Authentication is about confirming a user's identity by asking "is this really you"? Strategies for Implementing Authenticati...Discussauthentication
Sasha Tulchinskiycloudcaptain.asail.cloud·Jun 27, 2023A Curious Case of Amazon Cognito HTTP 500 errorsOur team was assisting a large client with the migration of on-prem applications to AWS and we chose to place these applications behind an Amazon Application Load Balancer (ALB), which was integrated with an Amazon Cognito User Pool with Azure Direct...Discuss·107 readsAWS