Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Is there a way to remove CognitoUserPool in Identity Providers and remove Sign in/Sign out URLs? #5481

Open
aedrianescultura opened this issue Oct 4, 2020 · 8 comments
Labels
auth Issues tied to the auth category of the CLI feature-request Request a new feature p3

Comments

@aedrianescultura
Copy link

Which Category is your question related to?
Authentication

Amplify CLI Version
4.29.4

What AWS Services are you utilizing?
Cognito

Provide additional details e.g. code snippets
Is there a way to disable the Cognito User Pool as one of the Identity Providers?
Is there a way to remove a URL in Callback and Sign out URLs section?

Capture

@ammarkarachi ammarkarachi added auth Issues tied to the auth category of the CLI question General question labels Oct 5, 2020
@ammarkarachi
Copy link
Contributor

@aedrianescultura you can run amplify update auth to update auth settings for the url. You can remove auth and re-add auth

@aedrianescultura
Copy link
Author

@aedrianescultura you can run amplify update auth to update auth settings for the url. You can remove auth and re-add auth

This option: Add/Edit signin and signout redirect URIs does not allow you to remove the redirect URIs. You can only add or edit, but you cannot remove the URI.

@kaustavghosh06
Copy link
Contributor

@aedrianescultura Answers to both your questions:
Q: Is there a way to disable the Cognito User Pool as one of the Identity Providers?
Answer: No - we do not support this as a feature today as we've not seen many customers using this pattern to disable cognito user pool login and only allow social login - I'll mark this as a feature request and if there are more customers needing this we can add it to our CLI flows.

Q: Is there a way to remove a URL in Callback and Sign out URLs section?
Right now, if you have social federation we require you to enter the callback and signout URL's following best practices. What's your use-case of enabling oAuth social federation but not have callback and signout URL's?

cc @renebrandel

@aedrianescultura
Copy link
Author

@kaustavghosh06 I do use callback and signout URLs. However, there was an instance where I needed to remove one of the URLs and I did not find a way to do this from the CLI.

@kaustavghosh06
Copy link
Contributor

@aedrianescultura Got it. Yes - the CLI UX doesn't allow for this today when you add multiple URL's. I'm adding this as an enhancement which we can look into. cc @renebrandel
As a workaround/escape-hatch, you can go into the amplify/backend/auth/<resource-name>/parameters.json file and manually update the "CallbackURLs" and "LogoutURLs " present in there.

@kaustavghosh06 kaustavghosh06 added enhancement and removed question General question labels Oct 22, 2020
@aedrianescultura
Copy link
Author

@kaustavghosh06 The enhancement would be great. Thanks for the workaround.

@siegerts siegerts added feature-request Request a new feature and removed enhancement labels Sep 3, 2021
@josefaidt josefaidt added the p3 label Jan 3, 2023
@evank28
Copy link

evank28 commented May 20, 2024

Any update on enabling social-only login?

@steffeng
Copy link

Regarding the removal of the CognitoUserPool: you can do this in gen2 amplify by overriding the CloudFormation resource:

const backend = defineBackend({ auth, data });
const { cfnUserPool, cfnUserPoolClient } = backend.auth.resources.cfnResources
cfnUserPoolClient.supportedIdentityProviders = cfnUserPoolClient.supportedIdentityProviders?.filter(
  i => i !== 'COGNITO'
)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth Issues tied to the auth category of the CLI feature-request Request a new feature p3
Projects
None yet
Development

No branches or pull requests

7 participants