AntStack Inc.Implementing OTP based Phone auth in Amazon Cognito using Custom Auth Flow & AmplifyAmazon Cognito provides authentication out of the box with support for most of the authentication methods. I wanted to have Phone & OTP…Nov 11
Nhyl Bryle IbañezIntegrating Google Sign-In with Amazon Cognito & Next.js: A Comprehensive OAuth 2.0 TutorialNo Hosted UI, no client-side authentication with AWS Amplify, just your no-BS guide in implementing a Google Sign-In on the server using…Dec 22, 20233
Nhyl Bryle IbañezSecure Social Logins with Proof of Key Code Exchange (PKCE) using Amazon Cognito and Next.jsThis article continues from my previous discussion on OAuth Integration using Amazon Cognito and Next.js. In that article, we explored how…Jul 4Jul 4
InAWS TipbyOmid EidivandiImpersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The…Apr 29Apr 29
Raviteja MureboinaAmazon CognitoWithin the realm of digital applications, user authentication and access control play pivotal roles in safeguarding security and enhancing…Jun 2Jun 2
AntStack Inc.Implementing OTP based Phone auth in Amazon Cognito using Custom Auth Flow & AmplifyAmazon Cognito provides authentication out of the box with support for most of the authentication methods. I wanted to have Phone & OTP…Nov 11
Nhyl Bryle IbañezIntegrating Google Sign-In with Amazon Cognito & Next.js: A Comprehensive OAuth 2.0 TutorialNo Hosted UI, no client-side authentication with AWS Amplify, just your no-BS guide in implementing a Google Sign-In on the server using…Dec 22, 20233
Nhyl Bryle IbañezSecure Social Logins with Proof of Key Code Exchange (PKCE) using Amazon Cognito and Next.jsThis article continues from my previous discussion on OAuth Integration using Amazon Cognito and Next.js. In that article, we explored how…Jul 4
InAWS TipbyOmid EidivandiImpersonation using AWS CongitoSecurity stands as a foundational element in software development, often taking center stage in architecture decisions and assessments. The…Apr 29
Raviteja MureboinaAmazon CognitoWithin the realm of digital applications, user authentication and access control play pivotal roles in safeguarding security and enhancing…Jun 2
InInfoSec Write-upsbyPreetham BommaHacking AWS Cognito Misconfiguration to Zero Click Account TakeoverHi all, hope you are keeping well and staying safe. This blog is about my recent Account Takeover finding.Feb 14, 2022
Cumhur AkkayaAmazon Cognito-1: Creating Cognito User Pools for authentication, and Connecting to an Application…We will create AWS Cognito User Pools for authentication, and we will connect to an application using the User Pools Hosted UI. We will…Sep 1, 2023
Reza RezvaniEasy guide to secure your EC2 using Amazon CognitoTo secure your EC2 instance using Amazon Cognito, you can follow these steps:Jan 28, 2023