Software Alternatives & Reviews

Controlling access in service-to-service communications with Cognito - Part 1

JSON Web Token Amazon Route 53 Amazon Cognito AWS Certificate Manager Amazon API Gateway
  1. JSON Web Tokens are an open, industry standard RFC 7519 method for representing claims securely between two parties.
    Pricing:
    • Open Source
    The access token is a JWT. If we inspect the token, we will see the required (and allowed) scopes there. The called service will validate if the required scopes are in the token.

    #Identity Provider #Identity And Access Management #SSO 276 social mentions

  2. Amazon Route 53 is a highly available and scalable DNS web service.
    We can have our own domain too, which we must configure in Route 53. Custom domains also require a public certificate, which we can get free from ACM.

    #Domain Name Registrar #Domain Names #Cloud Computing 44 social mentions

  3. Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. It scales to millions of users and supports sign-in with social identity providers and enterprise identity providers via SAML 2.0.
    Bob's solution starts with Amazon Cognito, which will generate the access tokens. The service that wants to access the other microservice will call Cognito and receive the token in the response (covered in this post).

    #Identity Provider #SAML #Identity And Access Management 63 social mentions

  4. AWS Certificate Manager from Amazon Web Services (AWS)
    We can have our own domain too, which we must configure in Route 53. Custom domains also require a public certificate, which we can get free from ACM.

    #Identity And Access Management #Network & Admin #Two Factor Authentication 23 social mentions

  5. Create, publish, maintain, monitor, and secure APIs at any scale
    Next the service will make a request to the API of the other service with the token placed in the Authorization header.

    #API Tools #APIs #Web Service Automation 94 social mentions

Discuss: Controlling access in service-to-service communications with Cognito - Part 1

Log in or Post with