1 Answer
- Newest
- Most votes
- Most comments
0
I will recommend looking at this post as well. https://aws.amazon.com/blogs/security/approaches-for-authenticating-external-applications-in-a-machine-to-machine-scenario/
answered a year ago
Relevant content
- asked 7 months ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated 9 months ago
- AWS OFFICIALUpdated a year ago
Hi, would this shed any light on? https://github.com/kyriakos96/aws-cognito-service-to-service-authentication