Software Alternatives & Reviews

Controlling access to IAM-protected API endpoints with Cognito groups

AWS Lambda AWS Identity and Access Management AWS ElasticWolf Client Console Amazon API Gateway AWS Mobile Services
  1. Automatic, event-driven compute service
    Pricing:
    • Open Source
    I discussed a way to control access to endpoints using JSON web tokens and a Lambda authorizer earlier.

    #Cloud Computing #Cloud Hosting #Backend As A Service 244 social mentions

  2. AWS Identity and Access Management enables you to securely control access to AWS services and resources for your users.
    Each group will have an IAM role assigned. The roles will allow read/write and read access to the members of the FullAccess and ReadOnlyAccess groups, respectively.

    #Identity And Access Management #Identity Provider #SSO 52 social mentions

  3. ElasticWolf is a client-side application for managing Amazon Web Services (AWS) cloud resources with an easy-to-use graphical user interface.
    When we call an AWS service API endpoint (e.g., API Gateway Invoke, SNS Publish or S3 CreateBucket), we must sign the request using Signature Version 4. The SDKs and the CLI will automatically do it on behalf of us using the credentials we provide. But when we protect a public API endpoint with IAM, we should build the logic to sign the request in the code.

    #Developer Tools #Weather Apps #Weather API 18 social mentions

  4. Create, publish, maintain, monitor, and secure APIs at any scale
    In this scenario we protect the backend compute resources with an HTTP API type of API Gateway. We'll set up IAM authorization at each route, which eliminates the need for tokens and custom authorizers. It's also the safest way to protect an endpoint since it delegates the authorization task to the robust IAM service.

    #API Tools #APIs #Web Service Automation 94 social mentions

  5. Storage, Analytics, Push Notif. & SMS Delivery SDKs
    We can use the Signer class Amplify provides in a React front-end application to sign the API requests whose targets are various the API Gateway endpoints.

    #Developer Tools #Realtime Backend / API #App Development 77 social mentions

Discuss: Controlling access to IAM-protected API endpoints with Cognito groups

Log in or Post with