Move from AWS Cognito

Authing can solve many problems in using Cognito. Using the Authing user pool can completely replace Cognito user pool and build a bridge between domestic users and AWS resources.
Solution consultation
Scene profile
During Web or App Development, users' authentication and permission processing are a very important module, including user registration, login authentication, and management corresponding permissions. In addition to the username password login, it is also very important to log in through third-party social account. It is mainly Google, Facebook or Apple Login, etc., which is mainly WeChat, Weibo login, etc.
Identity authentication and authorization implementation are complicated, so the Cognito service is provided on the AWS cloud to help developers are faster and safer to access user registration / login and access control functions. The Cognito service allows companies to spend more energy on the core business, pay attention to innovation, income, not too much attention to identity authentication and authorization-related underlying technical details.

Authing Value

Authang provides a simple, unified SDK for developers at the front end, and automatically handles the same identity identification, account merge, etc. based on OpenID, UnionID, three dimensions based on OpenID, UNIONID, and mobile phone numbers in the backend. Developers only need to call the front end SDK without having to worry about the various complex identity logic.
Architecture design
Demonstrate the overall structure of the website
The static website is hosted by S3, and the static content acceleration and the HTTPS certificate mount are carried out by CloudFront.
Using Authing to authenticate the login and obtain the token, as an alternative to the user pool.
Access the Rest API provided by API Gateway.
Obtain temporary AWS credentials through Cognito Identity Pool to access AWS resources (here, take Polly service as an example).
Login authentication and get token by Authing
Authing authenticates the user based on OIDC and OAuth 2.0 and grants the user access to the corresponding application.
The user requests to log in through the Authing user pool and gets the code from the server after successful authentication.
The application requests token with code through the identity pool.
Users can use token to request access to various application resources.
Access the protected REST API provided by API Gateway
The token (i.e. id_token) can be obtained after login and authentication through Authing. You can access the protected REST API by carrying a token in the header when sending an HTTP request.
Secure access to AWS services through integration with Identity Pool
The token (i.e. id_token) can be obtained after login and authentication through Authing. Through the integration with identity pool, temporary credentials can be obtained to access AWS resources safely.
authingauthingauthingauthing
Architecture design
Demonstrate the overall structure of the website
The static website is hosted by S3, and the static content acceleration and the HTTPS certificate mount are carried out by CloudFront.
Using Authing to authenticate the login and obtain the token, as an alternative to the user pool.
Access the Rest API provided by API Gateway.
Obtain temporary AWS credentials through Cognito Identity Pool to access AWS resources (here, take Polly service as an example).
authing

How Authing support various scenarios

API security
Improving API security and ensuring compliance with internal and external partner use cases in a zero trust environment can be challenging. Authing provides end-to-end API security and management based on an open standards approach.
authing
For users
Easily protect and expose your API by supporting all OAuth 2.0 authorization flows and fine-grained scope and permissions, so as to expand the market scope and provide a better user experience.
For applications and systems
You can easily facilitate secure communication between the API and non interactive external clients and internal APIs with the touch of a switch.
For enterprise developers
Enable third-party application servers, APIs and system backend to issue authenticated requests to your APIs, while always maintaining control over fine scope and permissions.
Numerous compliance certifications to ensure identity security
authing
There is no doubt that customer data security and compliance are the primary considerations of most companies. Authing has the most advanced security built into the product, so you don't have to worry about the security of your users and business.
Industry standard agreement: Improve the consistency and continuity of business operation and execution by adopting identity platforms that support industry certification standards such as OAuth and openid connect.
Compliance and certification: Comply with leading organizations, including soc2, SAML, openid connect, etc.
Public and private clouds: Host your application in authoring's public cloud, our private cloud or your AWS environment. Our highly available multi tenant cloud service can handle a large number of transactions every day.

Try Authing for free

Up to 3,000 free API calls to experience all features