UserPoolClient
Provides a Cognito User Pool Client resource.
Example Usage
Create a basic user pool client
using Pulumi;
using Aws = Pulumi.Aws;
class MyStack : Stack
{
public MyStack()
{
var pool = new Aws.Cognito.UserPool("pool", new Aws.Cognito.UserPoolArgs
{
});
var client = new Aws.Cognito.UserPoolClient("client", new Aws.Cognito.UserPoolClientArgs
{
UserPoolId = pool.Id,
});
}
}
package main
import (
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws/cognito"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
pool, err := cognito.NewUserPool(ctx, "pool", nil)
if err != nil {
return err
}
_, err = cognito.NewUserPoolClient(ctx, "client", &cognito.UserPoolClientArgs{
UserPoolId: pool.ID(),
})
if err != nil {
return err
}
return nil
})
}import pulumi
import pulumi_aws as aws
pool = aws.cognito.UserPool("pool")
client = aws.cognito.UserPoolClient("client", user_pool_id=pool.id)import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const pool = new aws.cognito.UserPool("pool", {});
const client = new aws.cognito.UserPoolClient("client", {
userPoolId: pool.id,
});Create a user pool client with no SRP authentication
using Pulumi;
using Aws = Pulumi.Aws;
class MyStack : Stack
{
public MyStack()
{
var pool = new Aws.Cognito.UserPool("pool", new Aws.Cognito.UserPoolArgs
{
});
var client = new Aws.Cognito.UserPoolClient("client", new Aws.Cognito.UserPoolClientArgs
{
ExplicitAuthFlows =
{
"ADMIN_NO_SRP_AUTH",
},
GenerateSecret = true,
UserPoolId = pool.Id,
});
}
}
package main
import (
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws/cognito"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
pool, err := cognito.NewUserPool(ctx, "pool", nil)
if err != nil {
return err
}
_, err = cognito.NewUserPoolClient(ctx, "client", &cognito.UserPoolClientArgs{
ExplicitAuthFlows: pulumi.StringArray{
pulumi.String("ADMIN_NO_SRP_AUTH"),
},
GenerateSecret: pulumi.Bool(true),
UserPoolId: pool.ID(),
})
if err != nil {
return err
}
return nil
})
}import pulumi
import pulumi_aws as aws
pool = aws.cognito.UserPool("pool")
client = aws.cognito.UserPoolClient("client",
explicit_auth_flows=["ADMIN_NO_SRP_AUTH"],
generate_secret=True,
user_pool_id=pool.id)import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const pool = new aws.cognito.UserPool("pool", {});
const client = new aws.cognito.UserPoolClient("client", {
explicitAuthFlows: ["ADMIN_NO_SRP_AUTH"],
generateSecret: true,
userPoolId: pool.id,
});Create a user pool client with pinpoint analytics
using Pulumi;
using Aws = Pulumi.Aws;
class MyStack : Stack
{
public MyStack()
{
var current = Output.Create(Aws.GetCallerIdentity.InvokeAsync());
var testUserPool = new Aws.Cognito.UserPool("testUserPool", new Aws.Cognito.UserPoolArgs
{
});
var testApp = new Aws.Pinpoint.App("testApp", new Aws.Pinpoint.AppArgs
{
});
var testRole = new Aws.Iam.Role("testRole", new Aws.Iam.RoleArgs
{
AssumeRolePolicy = @"{
""Version"": ""2012-10-17"",
""Statement"": [
{
""Action"": ""sts:AssumeRole"",
""Principal"": {
""Service"": ""cognito-idp.amazonaws.com""
},
""Effect"": ""Allow"",
""Sid"": """"
}
]
}
",
});
var testRolePolicy = new Aws.Iam.RolePolicy("testRolePolicy", new Aws.Iam.RolePolicyArgs
{
Policy = Output.Tuple(current, testApp.ApplicationId).Apply(values =>
{
var current = values.Item1;
var applicationId = values.Item2;
return @$"{{
""Version"": ""2012-10-17"",
""Statement"": [
{{
""Action"": [
""mobiletargeting:UpdateEndpoint"",
""mobiletargeting:PutItems""
],
""Effect"": ""Allow"",
""Resource"": ""arn:aws:mobiletargeting:*:{current.AccountId}:apps/{applicationId}*""
}}
]
}}
";
}),
Role = testRole.Id,
});
var testUserPoolClient = new Aws.Cognito.UserPoolClient("testUserPoolClient", new Aws.Cognito.UserPoolClientArgs
{
AnalyticsConfiguration = new Aws.Cognito.Inputs.UserPoolClientAnalyticsConfigurationArgs
{
ApplicationId = testApp.ApplicationId,
ExternalId = "some_id",
RoleArn = testRole.Arn,
UserDataShared = true,
},
UserPoolId = testUserPool.Id,
});
}
}
package main
import (
"fmt"
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws"
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws/cognito"
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws/iam"
"github.com/pulumi/pulumi-aws/sdk/v2/go/aws/pinpoint"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
current, err := aws.GetCallerIdentity(ctx, nil, nil)
if err != nil {
return err
}
testUserPool, err := cognito.NewUserPool(ctx, "testUserPool", nil)
if err != nil {
return err
}
testApp, err := pinpoint.NewApp(ctx, "testApp", nil)
if err != nil {
return err
}
testRole, err := iam.NewRole(ctx, "testRole", &iam.RoleArgs{
AssumeRolePolicy: pulumi.String(fmt.Sprintf("%v%v%v%v%v%v%v%v%v%v%v%v%v%v", "{\n", " \"Version\": \"2012-10-17\",\n", " \"Statement\": [\n", " {\n", " \"Action\": \"sts:AssumeRole\",\n", " \"Principal\": {\n", " \"Service\": \"cognito-idp.amazonaws.com\"\n", " },\n", " \"Effect\": \"Allow\",\n", " \"Sid\": \"\"\n", " }\n", " ]\n", "}\n", "\n")),
})
if err != nil {
return err
}
_, err = iam.NewRolePolicy(ctx, "testRolePolicy", &iam.RolePolicyArgs{
Policy: testApp.ApplicationId.ApplyT(func(applicationId string) (string, error) {
return fmt.Sprintf("%v%v%v%v%v%v%v%v%v%v%v%v%v%v%v%v%v%v", "{\n", " \"Version\": \"2012-10-17\",\n", " \"Statement\": [\n", " {\n", " \"Action\": [\n", " \"mobiletargeting:UpdateEndpoint\",\n", " \"mobiletargeting:PutItems\"\n", " ],\n", " \"Effect\": \"Allow\",\n", " \"Resource\": \"arn:aws:mobiletargeting:*:", current.AccountId, ":apps/", applicationId, "*\"\n", " }\n", " ]\n", "}\n", "\n"), nil
}).(pulumi.StringOutput),
Role: testRole.ID(),
})
if err != nil {
return err
}
_, err = cognito.NewUserPoolClient(ctx, "testUserPoolClient", &cognito.UserPoolClientArgs{
AnalyticsConfiguration: &cognito.UserPoolClientAnalyticsConfigurationArgs{
ApplicationId: testApp.ApplicationId,
ExternalId: pulumi.String("some_id"),
RoleArn: testRole.Arn,
UserDataShared: pulumi.Bool(true),
},
UserPoolId: testUserPool.ID(),
})
if err != nil {
return err
}
return nil
})
}import pulumi
import pulumi_aws as aws
current = aws.get_caller_identity()
test_user_pool = aws.cognito.UserPool("testUserPool")
test_app = aws.pinpoint.App("testApp")
test_role = aws.iam.Role("testRole", assume_role_policy="""{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "cognito-idp.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
""")
test_role_policy = aws.iam.RolePolicy("testRolePolicy",
policy=test_app.application_id.apply(lambda application_id: f"""{{
"Version": "2012-10-17",
"Statement": [
{{
"Action": [
"mobiletargeting:UpdateEndpoint",
"mobiletargeting:PutItems"
],
"Effect": "Allow",
"Resource": "arn:aws:mobiletargeting:*:{current.account_id}:apps/{application_id}*"
}}
]
}}
"""),
role=test_role.id)
test_user_pool_client = aws.cognito.UserPoolClient("testUserPoolClient",
analytics_configuration={
"application_id": test_app.application_id,
"external_id": "some_id",
"role_arn": test_role.arn,
"userDataShared": True,
},
user_pool_id=test_user_pool.id)import * as pulumi from "@pulumi/pulumi";
import * as aws from "@pulumi/aws";
const current = pulumi.output(aws.getCallerIdentity({ async: true }));
const testUserPool = new aws.cognito.UserPool("test", {});
const testApp = new aws.pinpoint.App("test", {});
const testRole = new aws.iam.Role("test", {
assumeRolePolicy: `{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "cognito-idp.amazonaws.com"
},
"Effect": "Allow",
"Sid": ""
}
]
}
`,
});
const testRolePolicy = new aws.iam.RolePolicy("test", {
policy: pulumi.interpolate`{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"mobiletargeting:UpdateEndpoint",
"mobiletargeting:PutItems"
],
"Effect": "Allow",
"Resource": "arn:aws:mobiletargeting:*:${current.accountId}:apps/${testApp.applicationId}*"
}
]
}
`,
role: testRole.id,
});
const testUserPoolClient = new aws.cognito.UserPoolClient("test", {
analyticsConfiguration: {
applicationId: testApp.applicationId,
externalId: "some_id",
roleArn: testRole.arn,
userDataShared: true,
},
userPoolId: testUserPool.id,
});Create a UserPoolClient Resource
new UserPoolClient(name: string, args: UserPoolClientArgs, opts?: CustomResourceOptions);def UserPoolClient(resource_name, opts=None, allowed_oauth_flows=None, allowed_oauth_flows_user_pool_client=None, allowed_oauth_scopes=None, analytics_configuration=None, callback_urls=None, default_redirect_uri=None, explicit_auth_flows=None, generate_secret=None, logout_urls=None, name=None, prevent_user_existence_errors=None, read_attributes=None, refresh_token_validity=None, supported_identity_providers=None, user_pool_id=None, write_attributes=None, __props__=None);func NewUserPoolClient(ctx *Context, name string, args UserPoolClientArgs, opts ...ResourceOption) (*UserPoolClient, error)public UserPoolClient(string name, UserPoolClientArgs args, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args UserPoolClientArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args UserPoolClientArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args UserPoolClientArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
UserPoolClient Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The UserPoolClient resource accepts the following input properties:
- User
Pool stringId The user pool the client belongs to.
- Allowed
Oauth List<string>Flows List of allowed OAuth flows (code, implicit, client_credentials).
- Allowed
Oauth boolFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- Allowed
Oauth List<string>Scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- Analytics
Configuration UserPool Client Analytics Configuration Args The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- Callback
Urls List<string> List of allowed callback URLs for the identity providers.
- Default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- Explicit
Auth List<string>Flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- Generate
Secret bool Should an application secret be generated.
- Logout
Urls List<string> List of allowed logout URLs for the identity providers.
- Name string
The name of the application client.
- Prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- Read
Attributes List<string> List of user pool attributes the application client can read from.
- Refresh
Token intValidity The time limit in days refresh tokens are valid for.
- Supported
Identity List<string>Providers List of provider names for the identity providers that are supported on this client.
- Write
Attributes List<string> List of user pool attributes the application client can write to.
- User
Pool stringId The user pool the client belongs to.
- Allowed
Oauth []stringFlows List of allowed OAuth flows (code, implicit, client_credentials).
- Allowed
Oauth boolFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- Allowed
Oauth []stringScopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- Analytics
Configuration UserPool Client Analytics Configuration The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- Callback
Urls []string List of allowed callback URLs for the identity providers.
- Default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- Explicit
Auth []stringFlows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- Generate
Secret bool Should an application secret be generated.
- Logout
Urls []string List of allowed logout URLs for the identity providers.
- Name string
The name of the application client.
- Prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- Read
Attributes []string List of user pool attributes the application client can read from.
- Refresh
Token intValidity The time limit in days refresh tokens are valid for.
- Supported
Identity []stringProviders List of provider names for the identity providers that are supported on this client.
- Write
Attributes []string List of user pool attributes the application client can write to.
- user
Pool stringId The user pool the client belongs to.
- allowed
Oauth string[]Flows List of allowed OAuth flows (code, implicit, client_credentials).
- allowed
Oauth booleanFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- allowed
Oauth string[]Scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- analytics
Configuration UserPool Client Analytics Configuration The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- callback
Urls string[] List of allowed callback URLs for the identity providers.
- default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- explicit
Auth string[]Flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- generate
Secret boolean Should an application secret be generated.
- logout
Urls string[] List of allowed logout URLs for the identity providers.
- name string
The name of the application client.
- prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- read
Attributes string[] List of user pool attributes the application client can read from.
- refresh
Token numberValidity The time limit in days refresh tokens are valid for.
- supported
Identity string[]Providers List of provider names for the identity providers that are supported on this client.
- write
Attributes string[] List of user pool attributes the application client can write to.
- user_
pool_ strid The user pool the client belongs to.
- allowed_
oauth_ List[str]flows List of allowed OAuth flows (code, implicit, client_credentials).
- allowed_
oauth_ boolflows_ user_ pool_ client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- allowed_
oauth_ List[str]scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- analytics_
configuration Dict[UserPool Client Analytics Configuration] The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- callback_
urls List[str] List of allowed callback URLs for the identity providers.
- default_
redirect_ struri The default redirect URI. Must be in the list of callback URLs.
- explicit_
auth_ List[str]flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- generate_
secret bool Should an application secret be generated.
- logout_
urls List[str] List of allowed logout URLs for the identity providers.
- name str
The name of the application client.
- prevent_
user_ strexistence_ errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- read_
attributes List[str] List of user pool attributes the application client can read from.
- refresh_
token_ floatvalidity The time limit in days refresh tokens are valid for.
- supported_
identity_ List[str]providers List of provider names for the identity providers that are supported on this client.
- write_
attributes List[str] List of user pool attributes the application client can write to.
Outputs
All input properties are implicitly available as output properties. Additionally, the UserPoolClient resource produces the following output properties:
- Client
Secret string The client secret of the user pool client.
- Id string
- The provider-assigned unique ID for this managed resource.
- Client
Secret string The client secret of the user pool client.
- Id string
- The provider-assigned unique ID for this managed resource.
- client
Secret string The client secret of the user pool client.
- id string
- The provider-assigned unique ID for this managed resource.
- client_
secret str The client secret of the user pool client.
- id str
- The provider-assigned unique ID for this managed resource.
Look up an Existing UserPoolClient Resource
Get an existing UserPoolClient resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: UserPoolClientState, opts?: CustomResourceOptions): UserPoolClientstatic get(resource_name, id, opts=None, allowed_oauth_flows=None, allowed_oauth_flows_user_pool_client=None, allowed_oauth_scopes=None, analytics_configuration=None, callback_urls=None, client_secret=None, default_redirect_uri=None, explicit_auth_flows=None, generate_secret=None, logout_urls=None, name=None, prevent_user_existence_errors=None, read_attributes=None, refresh_token_validity=None, supported_identity_providers=None, user_pool_id=None, write_attributes=None, __props__=None);func GetUserPoolClient(ctx *Context, name string, id IDInput, state *UserPoolClientState, opts ...ResourceOption) (*UserPoolClient, error)public static UserPoolClient Get(string name, Input<string> id, UserPoolClientState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Allowed
Oauth List<string>Flows List of allowed OAuth flows (code, implicit, client_credentials).
- Allowed
Oauth boolFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- Allowed
Oauth List<string>Scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- Analytics
Configuration UserPool Client Analytics Configuration Args The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- Callback
Urls List<string> List of allowed callback URLs for the identity providers.
- Client
Secret string The client secret of the user pool client.
- Default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- Explicit
Auth List<string>Flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- Generate
Secret bool Should an application secret be generated.
- Logout
Urls List<string> List of allowed logout URLs for the identity providers.
- Name string
The name of the application client.
- Prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- Read
Attributes List<string> List of user pool attributes the application client can read from.
- Refresh
Token intValidity The time limit in days refresh tokens are valid for.
- Supported
Identity List<string>Providers List of provider names for the identity providers that are supported on this client.
- User
Pool stringId The user pool the client belongs to.
- Write
Attributes List<string> List of user pool attributes the application client can write to.
- Allowed
Oauth []stringFlows List of allowed OAuth flows (code, implicit, client_credentials).
- Allowed
Oauth boolFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- Allowed
Oauth []stringScopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- Analytics
Configuration UserPool Client Analytics Configuration The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- Callback
Urls []string List of allowed callback URLs for the identity providers.
- Client
Secret string The client secret of the user pool client.
- Default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- Explicit
Auth []stringFlows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- Generate
Secret bool Should an application secret be generated.
- Logout
Urls []string List of allowed logout URLs for the identity providers.
- Name string
The name of the application client.
- Prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- Read
Attributes []string List of user pool attributes the application client can read from.
- Refresh
Token intValidity The time limit in days refresh tokens are valid for.
- Supported
Identity []stringProviders List of provider names for the identity providers that are supported on this client.
- User
Pool stringId The user pool the client belongs to.
- Write
Attributes []string List of user pool attributes the application client can write to.
- allowed
Oauth string[]Flows List of allowed OAuth flows (code, implicit, client_credentials).
- allowed
Oauth booleanFlows User Pool Client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- allowed
Oauth string[]Scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- analytics
Configuration UserPool Client Analytics Configuration The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- callback
Urls string[] List of allowed callback URLs for the identity providers.
- client
Secret string The client secret of the user pool client.
- default
Redirect stringUri The default redirect URI. Must be in the list of callback URLs.
- explicit
Auth string[]Flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- generate
Secret boolean Should an application secret be generated.
- logout
Urls string[] List of allowed logout URLs for the identity providers.
- name string
The name of the application client.
- prevent
User stringExistence Errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- read
Attributes string[] List of user pool attributes the application client can read from.
- refresh
Token numberValidity The time limit in days refresh tokens are valid for.
- supported
Identity string[]Providers List of provider names for the identity providers that are supported on this client.
- user
Pool stringId The user pool the client belongs to.
- write
Attributes string[] List of user pool attributes the application client can write to.
- allowed_
oauth_ List[str]flows List of allowed OAuth flows (code, implicit, client_credentials).
- allowed_
oauth_ boolflows_ user_ pool_ client Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
- allowed_
oauth_ List[str]scopes List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
- analytics_
configuration Dict[UserPool Client Analytics Configuration] The Amazon Pinpoint analytics configuration for collecting metrics for this user pool.
- callback_
urls List[str] List of allowed callback URLs for the identity providers.
- client_
secret str The client secret of the user pool client.
- default_
redirect_ struri The default redirect URI. Must be in the list of callback URLs.
- explicit_
auth_ List[str]flows List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
- generate_
secret bool Should an application secret be generated.
- logout_
urls List[str] List of allowed logout URLs for the identity providers.
- name str
The name of the application client.
- prevent_
user_ strexistence_ errors Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to
ENABLEDand the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set toLEGACY, those APIs will return aUserNotFoundExceptionexception if the user does not exist in the user pool.- read_
attributes List[str] List of user pool attributes the application client can read from.
- refresh_
token_ floatvalidity The time limit in days refresh tokens are valid for.
- supported_
identity_ List[str]providers List of provider names for the identity providers that are supported on this client.
- user_
pool_ strid The user pool the client belongs to.
- write_
attributes List[str] List of user pool attributes the application client can write to.
Supporting Types
UserPoolClientAnalyticsConfiguration
- Application
Id string The application ID for an Amazon Pinpoint application.
- External
Id string An ID for the Analytics Configuration.
- Role
Arn string The ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics.
- bool
If set to
true, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics.
- Application
Id string The application ID for an Amazon Pinpoint application.
- External
Id string An ID for the Analytics Configuration.
- Role
Arn string The ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics.
- bool
If set to
true, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics.
- application
Id string The application ID for an Amazon Pinpoint application.
- external
Id string An ID for the Analytics Configuration.
- role
Arn string The ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics.
- boolean
If set to
true, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics.
- application_
id str The application ID for an Amazon Pinpoint application.
- external
Id str An ID for the Analytics Configuration.
- role_
arn str The ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics.
- bool
If set to
true, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics.
Package Details
- Repository
- https://github.com/pulumi/pulumi-aws
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
awsTerraform Provider.