AWS API Gateway auth with Chrome extension - amazon-web-services

is there any possibility how to use Chrome(Google) identity to authenticate AWS API Gateway?
I know that AWS Cognito supports Google as external federated identity provider. However when creating OAuth client within Google Developers console for my Chrome App, only ClientID is generated. App secret is is available for web apps, mobile..., but not Chrome App.
Thank you for any advice.
Regards,
Robert

Related

SSO for Salesforce android app in Google workspace(as a service provider)

Google as a identity provider I am trying to achieve Single Sign-On (SSO) for Salesforce android app. Need help on choosing the authentication methods(Ex : SAML, OAuth2.0).
Documentation for the authentication methods will be of great help
I can see you were asking how to download the certificate from the IdP (I am unable to comment on the question by the way). You can download it from Admin console > Security > Set up Single Sign On for SAML applications and download the certificate your app is using from there.

Is the AWS Cognito right tool here?

There is a mobile app that uses OpenID Connect for SSO. That mobile app is not built with AWS. Developers of that app are asking me to provide my own SSO service with OpenID Connect that they can use it for user authentication in that app.
My question is: Does the AWS Cognito right tool to built my own SSO service with OpenID Connect that will suit well for the case described above?
yes, it will. Other alternatives are Auth0, Microsoft Azure AD

Connect Zendesk to AWS cognito for authentication

I have a react application which uses Amplify to connect to AWS cognito userpool. I wanted to connect zendesk to this userpool using SAML, so that any user, logged into my react application should automatically get logged into zendesk.
I went through zendesk's documentation for SSO and it supports SAML based authentication. But on congito side, it doesn't support SAML as an Identity Provider.
Can somebody please help me understand the right way of connecting these two applications?

Link/connect Google oidc external provider with aws cognito

Recently I faced a new requirement to link or connect Google oidc external provider with aws cognito.
Background: my frontend application is running in aws and integrated with cognito for users and groups. Due to new requirements I have to connect client web application (jupyterhub) which is running on GCP vm instances.
My question is here : is this compatible or possible to use Google IAP with external oidc provider which could link to aws cognito app client and provide cognito UI to login?
Has someone faced such situation?
I would appreciate any comments or thought on this scanerio.
Many thanks
Adam
You can authenticate users with a wide range of identity providers such as OIDC and more by combining IAP and Identity Platform.
Identity Platform can be used to sign in users with an OpenID Connect (OIDC) provider.

Can we authenticate application user with on-premise directory services with AWS Lambda?

Am looking for authentication methods with our on-premise directory other than AWS Cognito user pool. I saw Lambda can be integrated with Azure AD. Our directory is SAML integrated. Can i achieve this with AWS Lambda function.? And how can i get access tokens to authorize API Gateway after authentication. If Possible, Please let me know how to achieve. Thanks in Advance.