在 aws cognito 中获取身份调用的凭据时返回的访问密钥 Id 和 Secret 是什么?
What is the access key Id and Secret returned in get credentials for identity call in aws cognito?
我已经设置了 aws cognito 并想使用他们的联合身份根据我自己的数据库对用户进行身份验证,但是在调用 get_open_id_token_for_developer_identity() 然后调用 get_credentials_for_identity 之后获取令牌() 响应是 identityID、AccessKey、clientSecret 和会话令牌,但此 accesskey 和客户端机密与我的 root 用户甚至 IAM 用户的安全凭证不匹配,当在具有 AWS SIGNATURE 授权的邮递员中使用时,它会引发未经授权的错误。我在使用身份 ID 调用 get_credentials_for_identity() 并在 login{"cognito-identity.amazonaws.com":} 中获取凭据,但包含 accesskey 和客户端密码的响应确实不要让我点击现在使用 cognito
保护的 api
this accesskey and client secret do not match the security credentials for my root user or even the IAM users
这些是新的 临时凭据 未链接到您的根用户或您帐户中的其他 IAM 用户。来自 docs:
You can use Amazon Cognito to deliver temporary, limited-privilege credentials to your application, so that your users can access AWS resources.
这个解释多了here:
When a user logs in to your app, Amazon Cognito generates temporary AWS credentials for the user. These temporary credentials are associated with a specific IAM role. The IAM role lets you define a set of permissions to access your AWS resources.
我已经设置了 aws cognito 并想使用他们的联合身份根据我自己的数据库对用户进行身份验证,但是在调用 get_open_id_token_for_developer_identity() 然后调用 get_credentials_for_identity 之后获取令牌() 响应是 identityID、AccessKey、clientSecret 和会话令牌,但此 accesskey 和客户端机密与我的 root 用户甚至 IAM 用户的安全凭证不匹配,当在具有 AWS SIGNATURE 授权的邮递员中使用时,它会引发未经授权的错误。我在使用身份 ID 调用 get_credentials_for_identity() 并在 login{"cognito-identity.amazonaws.com":
this accesskey and client secret do not match the security credentials for my root user or even the IAM users
这些是新的 临时凭据 未链接到您的根用户或您帐户中的其他 IAM 用户。来自 docs:
You can use Amazon Cognito to deliver temporary, limited-privilege credentials to your application, so that your users can access AWS resources.
这个解释多了here:
When a user logs in to your app, Amazon Cognito generates temporary AWS credentials for the user. These temporary credentials are associated with a specific IAM role. The IAM role lets you define a set of permissions to access your AWS resources.