-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
(cognito): Add idpInitiated flag to UserPoolIdentityProviderSaml #29598
Comments
@badmintoncryer Do you want to take this and add it to #29588 ? |
@msambol Of course! I can take it. @Booligoosh If you prefer to create the PR yourself, that's fine too. Which do you want to? |
Hi @badmintoncryer, if you're happy to take it, that'd be awesome, cheers!! If you don't want to though, I can do it. |
@Booligoosh Sure! I'll take it😃 |
Thank you for the feature request and the PR! |
|
1 similar comment
|
Describe the feature
Cognito now supports IdP-initiated SAML auth flows, however it requires an option being set on the User Pool Identity Provider: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-SAML-session-initiation.html
The option is available in the AWS console under the "IDP-initiated SAML sign-in" section when editing a SAML identity provider, just under the "Sign-out flow" section.
Use Case
I can't currently enable IdP-initiated auth without using a CFN override:
Proposed Solution
Add a new prop
idpInitiated: boolean
toUserPoolIdentityProviderSaml
that controls whether ProviderDetails.IDPInit is set to "true" or "false".Other Information
Related to PR #29588 and issue #29494
Acknowledgements
CDK version used
2.115.0
Environment details (OS name and version, etc.)
Windows 10 Enterprise
The text was updated successfully, but these errors were encountered: