Machine to Machine authorization using Client Credentials flow in AWS Cognito and with API Gateway

Поделиться
HTML-код
  • Опубликовано: 3 дек 2024

Комментарии •

  • @manoj238
    @manoj238 3 месяца назад

    Precise to the point fully packed 16 mins. I like the fact that you did not waste time on creating lambda integration :)

  • @pariASDF
    @pariASDF 2 месяца назад +1

    Thank you very much. This is a clear tutorial with good explanation. ♥

  • @darkingsky
    @darkingsky Год назад +2

    Very good video: clear and directed to the point. Thanks

  • @maticase
    @maticase 5 месяцев назад +1

    This is a great video. There are not a lot of resources on this topic. Thanks...!

  • @toontwisthere
    @toontwisthere Месяц назад

    You are really great. Thank you for the awesome content.

  • @johnlowe6894
    @johnlowe6894 6 месяцев назад

    Really pleased I found this video, it's been a huge help.

  • @Alina_K137
    @Alina_K137 11 месяцев назад +1

    Thank you so much! Now it is clear

  • @ItsCloudHub
    @ItsCloudHub 2 месяца назад +1

    very nice video .

  • @pedroprado8295
    @pedroprado8295 10 месяцев назад

    Thank you for this video!

  • @PenguinSpdSlayeR
    @PenguinSpdSlayeR 7 месяцев назад

    Great video! But only showing auth through postman, people may struggle with a 'machine to machine' requests as the premice of the video made we expect.

  • @ramakantsingh7104
    @ramakantsingh7104 Месяц назад

    Thank you

  • @rahulvarma2100
    @rahulvarma2100 2 месяца назад

    is it possible to extend the Cognito configuration to use OIDC (e.g. Azure AD) for machine to machine authorization using JWT token?

  • @robsondouglas8040
    @robsondouglas8040 28 дней назад

    Great video, but this aproach is B2B. M2M is by the "device_code" flow.

  • @vijaykumarmotupalli6912
    @vijaykumarmotupalli6912 7 месяцев назад

    I did exactly same but i have multiple app clients for same userpool, one of the client using client credentials flow. If i use same user pool as authorizer it only accepting ID token but not access token so third client generated access token not working

  • @francistony7110
    @francistony7110 4 месяца назад

    but how can this client secret be kept secure...

  • @ai_deployer
    @ai_deployer Месяц назад

    I followed all steps and was able to get the token however token is not working when invoking API. getting bellow error:
    {
    "message": "Invalid key=value pair (missing equal-sign) in Authorization header (hashed with SHA-256 and encoded with Base64): 'fsdfdfdf/XXXXXXXewrwfsdfsdfewesdfsdf='."
    }