Let's talk

Move from AWS Cognito

Authing can solve many problems in using Cognito. Using the Authing user pool can completely replace Cognito user pool and build a bridge between domestic users and AWS resources.
Solution consultation
Scene profile
During Web or App Development, users' authentication and permission processing are a very important module, including user registration, login authentication, and management corresponding permissions. In addition to the username password login, it is also very important to log in through third-party social account. It is mainly Google, Facebook or Apple Login, etc., which is mainly WeChat, Weibo login, etc.
Identity authentication and authorization implementation are complicated, so the Cognito service is provided on the AWS cloud to help developers are faster and safer to access user registration / login and access control functions. The Cognito service allows companies to spend more energy on the core business, pay attention to innovation, income, not too much attention to identity authentication and authorization-related underlying technical details.

Authing Value

AWS Cognito User Pool Service is not online in the domestic area, for companies who want to use Cognito IDaaS services in China, Authing will be better. Authing can solve many problems using Cognito, Using Authing User Pool, you can fully replace Cognito User Pool to build a bridge between domestic users and AWS resources.
Architecture design
Demonstrate the overall structure of the website
The static website is hosted by S3, and the static content acceleration and the HTTPS certificate mount are carried out by CloudFront.
Using Authing to authenticate the login and obtain the token, as an alternative to the user pool.
Access the Rest API provided by API Gateway.
Obtain temporary AWS credentials through Cognito Identity Pool to access AWS resources (here, take Polly service as an example).
全面替代Cognito User Pool

How Authing support various scenarios

API security
Improving API security and ensuring compliance with internal and external partner use cases in a zero trust environment can be challenging. Authing provides end-to-end API security and management based on an open standards approach.
For users
Easily protect and expose your API by supporting all OAuth 2.0 authorization flows and fine-grained scope and permissions, so as to expand the market scope and provide a better user experience.
For applications and systems
You can easily facilitate secure communication between the API and non interactive external clients and internal APIs with the touch of a switch.
For enterprise developers
Enable third-party application servers, APIs and system backend to issue authenticated requests to your APIs, while always maintaining control over fine scope and permissions.
Numerous compliance certifications to ensure identity security
There is no doubt that customer data security and compliance are the primary considerations of most companies. Authing has the most advanced security built into the product, so you don't have to worry about the security of your users and business.
Industry standard agreement: Improve the consistency and continuity of business operation and execution by adopting identity platforms that support industry certification standards such as OAuth and openid connect.
Compliance and certification: Authing has a number of domestic and international compliance certifications, including the DJCP Level 3, SOC 2, GDPR, ISO 9001, CCPA, PCI, HIPAA and FERPA, etc., vowing to protect every user & business.
Public and private clouds: Host your application in authoring's public cloud, our private cloud or your AWS environment. Our highly available multi tenant cloud service can handle a large number of transactions every day.

Integrate Authing in 5 minutes

Single sign-on, authentication, authorization management, etc.