Created
February 21, 2019 03:08
-
-
Save miguelmota/8b519212aca47210d529532b3d8e5b2f to your computer and use it in GitHub Desktop.
AWS Cognito Identity authenticate using cURL
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
{ | |
"AuthParameters" : { | |
"USERNAME" : "[email protected]", | |
"PASSWORD" : "mysecret" | |
}, | |
"AuthFlow" : "USER_PASSWORD_AUTH", | |
"ClientId" : "9..............." | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
curl -X POST --data @auth.json \ | |
-H 'X-Amz-Target: AWSCognitoIdentityProviderService.InitiateAuth' \ | |
-H 'Content-Type: application/x-amz-json-1.1' \ | |
https://cognito-idp.us-east-1.amazonaws.com/ | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Dashboard -> "App Clients" -> "Show Details" -> check "Enable username-password (non-SRP) flow for app-based authentication (USER_PASSWORD_AUTH)" |
Can I use this when I have a Federation (Open Id)?
@LorhanSohaky It works with Open Id, but you'll miss the scopes in the returned token.
Thank you. Works as advertised. Saved me some time tonight.
This is just brilliant! Thanks a lot! I've already spent a few hours on research and debugging session!
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
very good, it worked