Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Seed POC: passwordless and MFA #2454

Draft
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

ShadowCat567
Copy link
Contributor

@ShadowCat567 ShadowCat567 commented Jan 28, 2025

Used admin credentials to avoid role assumption complexities in seed command. If there are any thoughts about sign in and passkeys, I would like to hear them.

Passkeys: what have I attempted

  1. see passwordless_authentication.ts for attempt with associateWebAuthnCredential() from the JS library -- doesn't work because Web credentials stuff from the JS library does not want to be used in a node environment, seems to only work if it is in a browser
  2. registering and using a passkey with SDK -- Cognito Documentation on Passkeys -- see Register a passkey (SDK), this got confusing when it came to actually being able to get access the passkey to be able to use it, could not figure out how to do it (see Sign in with a passkey)
  3. registering a passkey with managed login, did some research into this, crafting and using the links are the main problem that would make this difficult (see Register a passkey (managed login) in passkey documentation)

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

Copy link

changeset-bot bot commented Jan 28, 2025

🦋 Changeset detected

Latest commit: f9c59b9

The changes in this PR will be included in the next version bump.

This PR includes changesets to release 2 packages
Name Type
@aws-amplify/seed Minor
@aws-amplify/backend-cli Minor

Not sure what this means? Click here to learn what changesets are.

Click here if you're a maintainer who wants to add another changeset to this PR

CognitoIdentityProviderClient,
RespondToAuthChallengeCommand,
} from '@aws-sdk/client-cognito-identity-provider';
import { randomUUID, sign } from 'node:crypto';

Check notice

Code scanning / CodeQL

Unused variable, import, function or class Note

Unused import sign.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant