Search code examples
aws-lambdapostmanaws-cliamazon-cognito

AWS CLI - how to generate security tokens for a cognito user


Ultimately, I need to generate an AccessKeyId, SecurityKey and SessionToken for a user in a Cognito User Pool so that I can test a lambda function as a cognito user using Postman. So far, I've spent 2 days trying to figure this out. It seems that this would work:

aws sts assume-role-with-web-identity --role-arn arn:aws:iam::1234567890:role/rolename--role-session-name "RoleSession1" --web-identity-token ??? --provider-id provideridvalue

I was able to get the provider-id value but I'm having trouble getting a valid value for the web-identity-token.

If I understand correctly this should get me the web-identity-token:

aws cognito-idp initiate-auth --auth-flow USER_PASSWORD_AUTH --client-id clientidvalue --auth-parameters USERNAME=usernamevalue,PASSWORD=passwordvalue

I obtained the clientidvalue from the Federated Identities pool.

The problem I have been unable to resolve is that the above command gives me this error:

Unknown options: PASSWORD=<password>

I've tried many different variations including json format but nothing works. What am I doing wrong?


Solution

  • It works for me. I can't see any difference with yours

    Terminal Screenshot

    Are you using the app client id that you created at User Pool 'App clients' sections (not at federated identity section) ? If so, is this option checked ?

    Enable username-password (non-SRP) flow for app-based authentication (USER_PASSWORD_AUTH)

    I am using the token starting after 3600 till the next whitespace. Put it on postman header and call lambda behind Cognito Authorizer.

    UPDATE

    If anyone interested in single command shell script version of this -> Bash Script

    I use it quite often