Working with User Devices in Your User Pool

페이지 정보

작성자 Birgit Tegg 작성일25-10-14 02:07 조회7회 댓글0건

본문

While you register native person pool customers with the Amazon Cognito user pools API, you possibly can associate your users’ exercise logs from threat protection with each of their units and, optionally, enable your customers to skip multi-factor authentication (MFA) if they’re on a trusted gadget. Amazon Cognito features a device key within the response to any sign-in that doesn’t already embody device information. UUID. With a system key, a Secure Remote Password (SRP) library, and a user pool that permits iTagPro smart device authentication, iTagPro smart device you possibly can prompt users in your app to trust the present gadget and iTagPro smart device not immediate for iTagPro smart device an MFA code at sign-in. With Amazon Cognito user pools, you'll be able to associate every of your customers' devices with a singular machine identifier: a system key. When you present the system key and perform system authentication at signal-in, iTagPro smart device you possibly can configure your utility with a trusted machine authentication move. In this movement, your utility can present a selection to users to check in with out MFA until a later time, as determined by the safety necessities of your app or the preferences of your customers.



pexels-photo-7530583.jpegAt the top of that time period, your utility should change the device standing to not remembered and the user should register with MFA till they verify that they need to remember a gadget. For instance, your utility might immediate your customers to belief a device for 30, 60, iTagPro smart device or ninety days. You possibly can store this date in a custom attribute and on that date, change the remembered status of their gadget. You could then re-prompt your consumer to submit an MFA code and set the gadget to be remembered again after profitable authentication. 1. Remembered units can override MFA only in user pools with MFA lively. When your person signs in with a remembered gadget, you have to perform an extra system authentication during their authentication movement. For extra info, see Signing in with a device. Configure your consumer pool to remember units in the Sign-in menu of your consumer pool, travel security tracker beneath Device monitoring. Your person pool does not immediate customers to remember units once they check in.



When your app confirms a person's machine, your consumer pool at all times remembers the machine and does not return MFA challenges on future profitable gadget sign-ins. When your app confirms a consumer's system, your consumer pool doesn't routinely suppress MFA challenges. You need to immediate your consumer to choose whether or not they need to recollect the machine. When you select Always remember or User Opt-In, Amazon Cognito generates a gadget-identifier key and secret each time a person indicators in from an unidentified gadget. The machine key is the initial identifier that your app sends to your person pool when your user performs machine authentication. With every confirmed user system, whether or not remembered routinely or iTagPro smart device opted-in, you should use the machine-identifier key and secret to authenticate a machine on every user signal-in. You can also configure remembered-gadget settings for your user pool in a CreateUserPool or UpdateUserPool API request. For extra info, see the DeviceConfiguration property. The Amazon Cognito user swimming pools API has further operations for remembered units.



1. ListDevices and AdminListDevices return a list of the gadget keys and their metadata for a person. 2. GetDevice and AdminGetDevice return the gadget key and metadata for iTagPro online a single machine. 3. UpdateDeviceStatus and AdminUpdateDeviceStatus set a consumer's system as remembered or not remembered. 4. ForgetDevice and AdminForgetDevice take away a user's confirmed device from their profile. API operations with names that start with Admin are for use in server-side apps and must be authorized with IAM credentials. For extra information, see Understanding API, OIDC, and managed login pages authentication. KEY, Amazon Cognito returns a brand new gadget key within the response. In your public client-facet app, place the system key in app storage in an effort to embrace it in future requests. In your confidential server-side app, set a browser cookie or one other shopper-aspect token together with your user’s machine key. Before your user can check in with their trusted gadget, your app should affirm the machine key and supply extra information. Generate a ConfirmDevice request to Amazon Cognito that confirms your user’s gadget with the system key, a friendly identify, password verifier, and a salt.



When you configured your person pool for decide-in gadget authentication, Amazon Cognito responds to your ConfirmDevice request with a immediate that your user must choose whether or not to recollect the present device. Respond along with your user’s selection in an UpdateDeviceStatus request. When you affirm your user’s gadget but don’t set it as remembered, iTagPro smart device Amazon Cognito stores the affiliation but proceeds with non-machine signal-in when you present the system key. Devices can generate logs which might be helpful for user safety and iTagPro bluetooth tracker troubleshooting. A confirmed however unremembered device doesn’t take advantage of the sign-in feature, but does benefit from the safety monitoring logs function. While you activate threat safety in your app shopper and encode a machine fingerprint into your request, Amazon Cognito associates consumer events with the confirmed machine. 1. Start your user’s signal-in session with an InitiateAuth API request. 2. Reply to all authentication challenges with RespondToAuthChallenge till you receive JSON internet tokens (JWTs) that mark your user’s signal-in session complete.

댓글목록

등록된 댓글이 없습니다.