Amazon Cognito user pools are one of two primary components of Amazon Cognito. They allow you to create and manage user identities, handle user registration and sign-in, and securely authenticate users.
With user pools, you can set up customizable sign-up and sign-in pages for your applications, support different authentication methods (such as linking username/password, social login, or corporate identities), and manage user profile information. They also offer security features such as MFA and integration with AWS services.
Furthermore, user pools take care of user registration, authentication, and profile management, making it easier for developers to handle user accounts and security in their applications without reinventing the wheel. Once a user is authenticated via the user pool, either from the user pool itself or via a third-party IdP, Amazon Cognito will generate tokens that manage the access to your cloud-based or mobile application.
It is also possible to enable additional features using user pools, such as MFA to provide additional security to your user base. You can also create user pool groups and assign different permissions to each. This provides greater access control and prevents all users from having the same access, which might pose a security risk.
As part of the authentication response, when a user successfully authenticates with a user pool, Amazon Cognito generates a JSON Web Token (JWT). This JWT serves as proof of authentication and contains information about the user, such as their identity, user attributes, and authentication status. The JWT is typically used by the client application’s subsequent requests for access to protected resources within the application.
When a user seeks authentication through Amazon Cognito using an IdP to access a user pool, as shown in Figure 15.1 on the right-hand side, a streamlined process ensures security and ease of access. Initially, the user interacts with the application or service, shown on the far left, which then redirects the user to Amazon Cognito’s authentication page. From there, the user selects the preferred IdP, such as Google or Facebook, providing credentials for authentication. Upon successful authentication, the IdP generates an authentication assertion, including user identity details, and sends it back to Amazon Cognito. Amazon Cognito validates the assertion, exchanging it for temporary AWS credentials and a JWT. This JWT holds pertinent user information and is used for subsequent authorization within the user pool, granting access to requested resources within the application or service.
User pools in Amazon Cognito provide the functionality of refreshing expired or expiring access tokens. When a user presents a refresh token, the Amazon Cognito service verifies its validity and issues a new access token. The new access token is a JWT that allows the user to continue accessing protected resources without re-entering their credentials.
Once your users are stored in a Cognito user pool, you need to provide them with a set of permissions that will enable them to access the AWS resources that your application uses. This is what you will learn about in the next section with Cognito identity pools.
Thant Zin Phyo@Cracky (MCT, MCE, MVP)