-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not able to get any OAuth or custom Scopes in Access Token #42
Comments
@klaytaybai been this issue marked as "feature-request", does it mean I cannot use aws-sdk-net-extensions-cognito to get OAuth or custom scopes right now? |
I have the same issue and have opened a case # 6756083471 when using third party idp like google or facebook, it returns all scopes but for cognito idp it does not: GOOGLE IDP COGNITO IDP |
Other values are obfuscated intentionally |
They must be a workaround to this??? Someone knows??? Will be much appreciated. |
Hi. Is there any update on this issue? Would be great to access the |
Hi, Any update on the above issue? We are trying to add custom scopes in AWS Cognito through resource servers but after logging in, the access token doesn't have any custom scopes. Thanks. |
This is still an issue. Any update? |
Needs review with the team. There were lot of open issues in the past which were closed due to inactivity. |
Thanks, this is definitely still a problem that I am encountering. |
Same issue, it's a huge flaw of Cognito. |
I'm not dismissing the issue with custom scopes but this library has no control over what is return in the access token. This is a service issue that has to be addressed at the service not the client library. The AWS .NET SDK team which owns this library can't make that service level change. |
|
Seems to have been fixed on Cognito User Pools: https://aws.amazon.com/about-aws/whats-new/2023/12/amazon-cognito-user-pools-customize-access-tokens/ |
Hello:
I am writing an application using Vue as the frontend, and asp.net core web api as the backend.
I am using "Authorization code grant" only for now, will add PKCE later.
Yet the only scope I am able get from the returned access token is "aws.cognito.signin.user.admin"
Below is content is the Access Content Payload, replaced some info with ****
Allowed OAuth Scopes is checked for "phone", "email", "openid", "aws.cognito.signin.user.admin" and "profile" in App client settings for uesr pool.
For backend Web API we are using Authenticating with Secure Remote Protocol (SRP)
Yet, we are not able to get any OAuth scopes such as "openid" and "profile", or any "custom scopes"
Please advice on how can we get "OAuth scope" and "custom scopes" Amazon Cognito Authentication Extension Library or do I need to use ASP.NET Core Identity Provider?
Thank
Hans
The text was updated successfully, but these errors were encountered: