使用Auth0进行AWS放大 [英] aws-amplify with Auth0

查看:67
本文介绍了使用Auth0进行AWS放大的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我们已经为我们的React Native App分别提供了Auth0和aws-amplify.但是,将身份验证从Auth0流到Cognito/User-Pools的下一步(甚至遵循Auth0和AWS文档)也没有用.

We've got Auth0 and aws-amplify working separately for our React Native App. But, going the next step (even following the Auth0 and AWS docs) for getting the authentication to flow from Auth0 to Cognito/User-Pools has not been working.

但是,我们尚未找到有关堆栈溢出或Auth0或其他存在相同问题的讨论.我们是否有可能遗漏了某些东西?

Yet, we've not found discussion on stack overflow, or Auth0 or others with the same problem. Is it possible that we are missing something?

aws-amplify确实暗示OpenID Connect和联合身份正在运行,但是该库可能尚未支持此流程.

aws-amplify does imply that OpenID Connect and Federated Identities are working, but its possible that the library is not yet supporting this flow.

引用: https://github.com/aws/aws-amplify/issues/58 https://auth0.com/docs/integrations/integrating-auth0-amazon-cognito-mobile-apps https://docs.aws.amazon.com/cognito/Latest/developerguide/open-id.html

有人可以使用一个有效的示例或其他文档来调试流程吗?现在,它默认为Auth0和aws-amplify通讯后的来宾/非身份验证路由,而不是启用身份验证并为用户应用我们的策略.

Does anyone have a working example or other docs that we could use to debug the flow? Right now it defaults to the guest/unauth route after Auth0 and aws-amplify communicate, rather then enabling authentication to flow and our policies to be applied for the user.

推荐答案

您好,我们在存储库中有此功能请求. https://github.com/aws/aws-amplify/issues/239

Hi we have this feature request in the repo. https://github.com/aws/aws-amplify/issues/239

这篇关于使用Auth0进行AWS放大的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆