This post discusses the importance of security in software development, focusing on the concepts of authentication and authorization. It explores the use of Amazon Cognito for identity and access management and explains the process of impersonation using AWS Cognito. The post also covers JWT, its structure, and common attacks.

13m read time From awstip.com
Post cover image
Table of contents
Impersonation using AWS CongitoJson Web Token ( JWT )JWT Attacks:OAuth and OIDCAmazon CognitoWhat we gonna buildSource CodeUser Pool and App ClientSign Up / Sign InImpersonationInitiate Auth: DefineAuthChallengeRespond Auth Challenge: VerifyAuthChallengeRespond Auth Challenge: DefineAuthChallengeRespond Auth Challenge: PreTokenGenerationAuthorizerUser SessionImpersonationRunning the authorization serverConclusion

Sort: