- 最新
- 最多得票
- 最多評論
Hello, Based on the scenario that you have outlined, It seems that you have IAM authorization configured on the User model like
@auth(rules: [{ allow: private, provider: iam }])
In this case, IAM-based @auth rules are scoped down to only work with Amplify-generated IAM roles. To allow-list a custom role (for e.g. PreSignUp Lambda trigger's execution role), you'd need to update the existing or create amplify/backend/api/<your-api-name>/custom-roles.json
and include the custom role name. Kindly ensure that you push the changes to the backend once you have updated the custom-roles.json
. Please find the reference documentation for the same here.
Having said that, if you are still facing the challenges, please feel free to reach out to us via Support Center with the resources information like schema.graphql
, local amplify
folder contents, code snippets of Lambda function that are making these requests.
相關內容
- 已提問 10 個月前
- 已提問 6 個月前
- AWS 官方已更新 3 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 1 年前