Wilson KOMLANblog.wilsonkomlan.com·Aug 28, 2024Securing REST APIs with Amazon Cognito: A Step-by-Step GuideSecurity in internet-facing or local applications is one of the most challenging parts of the software development life cycle. This post will provide a quick step-by-step guide to implementing access management for the previous REST API using Amazon ...DiscussHow to Set Up a Secure and Cost-Effective Serverless Backend Using AWSAPIs
Freddy Hofreddyho.hashnode.dev·Aug 17, 2024Using AWS Secrets Manager to rotate a Amazon Cognito user passwordRecently, I have been working on creating automated tests for an API. For testing, a "tester" API user in a Amazon Cognito user pool is used to perform the authorised test API calls. Following good security practices, the tester API user credentials ...Discuss·96 readsAWS secret manager
SUJANforAWS X SUJANsujanmagar.com.np·Aug 10, 2024Securing API with Cognito User PoolHello Everyone, In this blog, we’ll explore Amazon Cognito, a powerful AWS service for managing user authentication and access control in applications. We’ll also demonstrate how to use Amazon Cognito to secure APIs, ensuring that only authorized use...DiscussAWS
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Jul 10, 2024From Zero to Hero: Creating Secure Cognito Identity Pools Using Terraform Without Prior ExperienceIntroduction :- Welcome! If you’re eager to learn how to set up secure Cognito Identity Pools with Terraform but have no idea where to start, you’re in the right place. This document will guide you from knowing nothing about these technologies to set...DiscussCognito
Jayesh Rajputjayeshrajput.hashnode.dev·Jun 20, 2024A Beginner's Guide to Securing Apps with Amazon CognitoWhen building web applications, user authentication and authorization can be challenging. Amazon Cognito simplifies this process for developers by providing convenient sign-up, sign-in, and enhanced security functionalities. Amazon Cognito is a ful...Discuss·5 likesAWS
Sri Durgesh Vsridurgeshv.hashnode.dev·May 17, 2024Enhancing Security in Your E-Commerce Platform: Integrating AWS Cognito with Your React Application [Part - 1]Introduction: Welcome back to the journey of architecting the future of e-commerce. In this installment, we delve into the cornerstone of user trust and security: authentication. Join me as I explore the intricacies of implementing user authenticatio...Discuss·10 likes·32 readsAWS
Omid EidivandiforServerless Folks Blogsblogs.serverlessfolks.com·Apr 30, 2024Impersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The approach to security, both in mindset and execution, can differ depending on factors like the intended usage s...Discussserverless computing
Omid Eidivandiserverlessfolks.com·Apr 29, 2024Impersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The approach to security, both in mindset and execution, can differ depending on factors like the intended usage s...Discuss·1 like·564 readsAmazon Cognito
Raul NaupariProblog.raulnq.com·Apr 3, 2024How to Implement Authorization in .NET APIs with Amazon CognitoAuthorization is the process that determines what users can do after they are authenticated. In the .NET ecosystem, it's straightforward to implement the most common approaches, such as role-based access control (RBAC) or attribute-based access contr...Discuss·80 readsAWS
Raul NaupariProblog.raulnq.com·Mar 28, 2024Securing .NET APIs with Amazon CognitoIn this article, we delve into securing .NET APIs with Amazon Cognito, specifically focusing on ensuring authenticated users have the necessary permissions to access resources. Building on the foundation laid in the previous article, Amazon Cognito A...Discuss·50 reads.NET