- Newest
- Most votes
- Most comments
Hello there,
Firstly I would like to inform you that secret with the app client does not impact lambda triggers in any ways.
As per the understanding of the flow described above when prevent user existence errors will be disabled , and user does not exist ideally only the migrate user lambda trigger should be invoked.
Amplify by default uses 'USER_SRP_AUTH' auth flow.'USER_SRP_AUTH' flow is not supported by UserMigration lambda trigger.
Before you add a user migration trigger, activate the USER_PASSWORD_AUTH or ADMIN_USER_PASSWORD_AUTH flow in the settings of your app client. You must use these flows instead of the default USER_SRP_AUTH flow. Amazon Cognito must send a password to your Lambda function so that it can verify your user's authentication in the other directory. An SRP obscures your user's password from your Lambda function.
Please do refer
So I would suggest over-riding this by following
[+]https://aws-amplify.github.io/docs/js/authentication#manual-setup
Amplify.configure({ Auth: { // ... // OPTIONAL - Manually set the authentication flow type. Default is 'USER_SRP_AUTH' authenticationFlowType: 'USER_PASSWORD_AUTH'
I have also found one third party article regarding the similar issue.I would suggest you to go through same
[+]https://github.com/aws-amplify/amplify-js/issues/2634
For the detailed discussion regarding the use case,I would suggest to engage support through a support case , so we know the resources involved and will be able to troubleshoot better.
I hope that the above information helps to address your concerns
Relevant content
- asked 8 months ago
- Accepted Answerasked 4 days ago
- asked 3 months ago
- AWS OFFICIALUpdated 5 months ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
Hi Anjali! First of all, thank you for your answer to my question, we didn't know about that, but we tried it, yet it won't recognize the flow we're manually setting.
Even though we set Amplify.configure Auth to authenticationFlowType: 'USER_PASSWORD_AUTH', the payload is still showing as "AuthFlow": "USER_SRP_AUTH".
Clearly you were spot on on the issue, but we can't get it to recognize the USER_PASSWORD_FLOW. (We have that flow enabled in the App client, and disabled the USER_SRP_FLOW)