O'Reilly logo

AWS Lambda in Action: Event-driven serverless applications by Danilo Poccia

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Managing identities

This chapter covers

  • Introducing the identity features provided by Amazon Cognito
  • Using external authentications already integrated with Amazon Cognito
  • Integrating your own custom authentication
  • Managing authenticated and unauthenticated identities in your application

In the previous chapter you learned how to use Lambda functions in different use cases, configuring the required permissions for those functions to act on other AWS resources such as S3 buckets or DynamoDB tables. But it’s still not clear how to manage authentication for external users interacting with AWS resources and Lambda functions via a client application (figure 6.1).

Figure 6.1. External users using AWS resources, such as Lambda functions ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required