Fine-grained Access Control with Amazon Cognito Identity Pools

Поделиться
HTML-код
  • Опубликовано: 3 авг 2024
  • An overview of how to implement fine-grained access control with Amazon Cognito Identity Pools and a demonstration of using attributes from identity providers for access control. Learn more about Amazon Cognito Identity Pools at - amzn.to/3s9gckK.
    Subscribe:
    More AWS videos - bit.ly/2O3zS75
    More AWS events videos - bit.ly/316g9t4
    #AWS
  • НаукаНаука

Комментарии • 52

  • @prannoyroy5312
    @prannoyroy5312 2 года назад +6

    Crystal clear , well articulated and To the point! Wish this guy did more such educational videos for confusing AWS services.

    • @IsanHawke
      @IsanHawke 7 месяцев назад

      Agreed. 100%

  • @alvaromartin6301
    @alvaromartin6301 Год назад +1

    Really thank you for this video. Is far better to understaning Cognito like this rather than read documentation. Well done!

  • @vibinaravindakshan719
    @vibinaravindakshan719 Год назад +3

    Mahmoud, hands down the best explanation and demo on fine grained RBAC for S3 using Cognito. I was using a rather dumb way of assigning a separate bucket to a user, for my use case. Access based on tags makes this ridiculously easy to use. Thanks so much for this content! You are frigging awesome!

  • @saltukkezer5100
    @saltukkezer5100 2 года назад +4

    This is such a practical example of the more or less theoretical explanations in the cognito docs! I'm happy to have found this, because this connects perfectly with the docs! Thanks for creating!

  • @jmrah
    @jmrah 3 года назад +6

    Top-notch explanation. Wish I could upvote it more than once! Thank you very much for putting this video together.

  • @aayushpurswani9630
    @aayushpurswani9630 11 месяцев назад

    Such a good explanation, solved in minutes what I was trying to solve for hours. Thank you.

  • @rodoherty1
    @rodoherty1 2 года назад

    Excellent tutorial! I have struggled to understand Identity Pools and this video definitely helps.

  • @yustiono
    @yustiono 2 года назад

    This is very awesome. Welldone, Mahmoud and AWS!

  • @khoavo5758
    @khoavo5758 Год назад

    I like how the length of this video is exactly 20:20!

  • @ofabio1
    @ofabio1 2 года назад

    Thanks for sharing with us!

  • @PriyankRupareliya
    @PriyankRupareliya 6 месяцев назад

    This is treasure. Thank you !

  • @ganesh221b
    @ganesh221b 3 года назад

    This was useful, awesome video! Thank you :)

  • @RachetKhanal
    @RachetKhanal Год назад

    Thank you very very much for this superb tutorial

  • @mauriceolum1540
    @mauriceolum1540 3 года назад +2

    Awesome!

  • @TheBalancedAmerican
    @TheBalancedAmerican 3 года назад

    Great Video! Question: Is it possible to define PrincipalTag mapping in a Cloudformation or SAM template?

  • @krknpl10
    @krknpl10 3 года назад +1

    Thank you for the wonderful tutorial. Got it working most, however, when i do custom mapping with principle key that has multi-value attributes e.g. ["value1", "value2"], it throws error saying "Invalid identity pool configuration. Check assigned IAM roles for this pool." even though works with single value attribute mapping conditional permission as expected. Here is condition:
    "Condition": {
    "ForAnyValue:StringEqualsIgnoreCase": {
    "s3:ExistingObjectTag/groups": "${aws:PrincipalTag/groups}"
    }
    }

  • @manishpal2703
    @manishpal2703 3 года назад +2

    Here he is getting department, & clearance in token . As far as I know, it is not in-built attributes and if it custom, then it should be custom:department & custom:clearance in JWT token.

  • @sukuranbo
    @sukuranbo 2 года назад

    Thank you for this tutorial. Really practical for my use cases. May I ask, in your Id Token, you hard department and clearance as the key names. I assume that's from the User pool custom attributes? I tried doing this my Id token was able to include this. However, the keys included "custom:" in the name, like "custom:department":"Sales". How did you manage to just get "department":"legal"? Was this done via the pre-token lambda or something else??? Thanks in advance.

  • @Viet100
    @Viet100 2 года назад

    I cannot get the IdentityID. Any special setup on Headers tab at Postman?

  • @flashliqu
    @flashliqu Год назад +1

    How do you config the postman to get the token?

  • @asifkalam9190
    @asifkalam9190 3 года назад +2

    What url are you using in POST request for getId

  • @kufena
    @kufena 3 года назад +4

    I'd like to know how to add these mappings of principle tags to my cloudformation/SAM template? I declare the schema for the user pool, a user pool client, and the use these in as the provider for the identity pool. But I can't see a way of declaring these tags, so that I can use them in my identity role. Any suggestions?

    • @sloopyfari
      @sloopyfari 3 года назад

      Any update on this? Is it possible to define those tags using cloudformation?

    • @kufena
      @kufena 3 года назад

      @@sloopyfari Nope - can't see that there's any way to do this as yet. There's an AWS::Cognito::UserPoolIdentityProvider thing, which has some kind of attribute mapping, but I don't think it has anything to do with these tags, and seems to be for federated providers like facebook or google.

  • @thantzintun8477
    @thantzintun8477 2 года назад

    whats replaced at variable {{cognito-identity-regional-endpoint}} in your postman request?

  • @antorixico
    @antorixico 3 года назад +2

    Rules or roles?, I'm a little confused

  • @sethbrokalis9824
    @sethbrokalis9824 2 года назад

    Are there any security concerns with this of users modifying the request so that their department/confidentiality level is different?

  • @MrRokkit
    @MrRokkit 2 года назад

    15:10 Why does Cognito force you to pass the *id_token* (rather than the access_token)?
    For whatever reason (if anybody knows please share) the access_token doesn't contain an *aud* claim, so can't be used to authenticate.

  • @lute248
    @lute248 2 года назад

    I'm using AWS academy account (formerly AWS educate) and currently i'm not permitted to create any IAM role (i'm prompt an error message sayng i'm not authorized). What the alternative solution if i want to set up fine-grained access
    control permissions involving uploading files to an S3 bucket, invoking Lambda functions to execute my app's business logic and accessing the database for data storage and retrieval without the use of IAM roles?

  • @chayanontpotawananont9317
    @chayanontpotawananont9317 3 года назад +5

    where can i find cognito-identity-regional-endpoint ?

    • @alecsaunders8799
      @alecsaunders8799 3 года назад

      This doc shows all of the endpoints for each region (docs.aws.amazon.com/general/latest/gr/cognito_identity.html). It's still not working for me though. Does anyone know if I need to add a path to the end (i.e. endpoint/getid or something)?

    • @naveenkhanna4564
      @naveenkhanna4564 3 года назад

      @@alecsaunders8799/ Any luck on this ?

    • @badam1111
      @badam1111 3 года назад +3

      It’s a bit confusing, but the regional endpoints can be found here - docs.aws.amazon.com/general/latest/gr/cognito_identity.html, however you still need to properly configure your request to get a 200 response, which includes setting the custom headers for AWS shown in this example: docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetId.html#API_GetId_Examples (X-AMZ-TARGET: com.amazonaws.cognito.identity.model.AWSCognitoIdentityService.GetId)

    • @s80275
      @s80275 2 года назад +1

      @@badam1111 This step took me a half-day!!!

    • @dishothamsuvarna2714
      @dishothamsuvarna2714 Год назад

      @@badam1111 Can you share what all needs to be added in the Headers section in Postman for this to work?

  • @naseerahmedkhan4474
    @naseerahmedkhan4474 3 года назад

    you are a god

  • @abhaymendiratta9187
    @abhaymendiratta9187 3 года назад

    post request give unkown operation exception

  • @user-nt9sw8fw7d
    @user-nt9sw8fw7d Год назад

    what is the exact URLs for Cognito Identity regional endpoint, used to fetch credentials??

    • @awssupport
      @awssupport Год назад

      Hi, Vaibhav. 👋 The technical nature of your query is slightly outside our support scope on this platform. Check out our available resources to get some assistance with this: go.aws/get-help. 🤓 ^RW

  • @nathansiva-wt5rb
    @nathansiva-wt5rb 3 года назад +5

    Thank you but I have difficulty differentiating your accent wrt "role" and "rule". They sound the same....

    • @vibinaravindakshan719
      @vibinaravindakshan719 Год назад

      Wow! the presenter has done a fantastic job explaining complex access control, and instead of applying your mind to understand, you criticize his "accent".

    • @HussainMohammedAshruf
      @HussainMohammedAshruf Год назад

      Rule means upon a condition assign/assume a Role. Role refers to predefined/create an IAM Role.

  • @antorixico
    @antorixico 3 года назад +1

    Please, can you add subtitles? The autogenerated ones don't help much and is hard to get your accent