amazon web services - Does Cognito User Pool Authorizer in Gateway API require all requests to be signed? -


the documentation using cognito user pool authorizer gateway api says should:

  1. call api methods configured user pool authorizer, supplying unexpired token in authorization header or header of choosing.

this echoed other texts on web.

however, when try using token, error message informs missing credentials, signature, signed headers params (and date header). token using correct passes test in authorizer's web gui.

my question has 2 parts:

  • does mean using cognito user pool authorizer requires me sign each request? there way configure accept valid token?

  • if want keep http calls amazon gateway simple , authorize them token (so can performed hand, python backend etc.), forced write custom authorizer using lambda? or there better option?

cognito user pool authorizer not require signature on request. have pass jwt version of openid connect identity token produced cognito in authorization header of each request.

result.getidtoken().getjwttoken() 

this should answer both questions.

i think getting confused cognito identity service, exchanges valid identity public identity provider (facebook, amazon, user pools, etc) temporary aws credentials. can use aws credentials cognito identity service sign requests.

if using user pools, result of successful authentication oidc identity token , jwt access token. api gateway, when configured user pool authorizer, uses identity token authenticate request.


Comments

Popular posts from this blog

Command prompt result in label. Python 2.7 -

javascript - How do I use URL parameters to change link href on page? -

amazon web services - AWS Route53 Trying To Get Site To Resolve To www -