Hackernoon logo
Hackernoon
15,522 reads

AWS Cognito User Pools or Identity Pools: what do I use to secure my API?

by
byDavid García@Da_vidgf

AWS/Serverless Developer

May 30th, 2018
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
Read on Terminal ReaderPrint this storyRead this story w/o Javascript
featured image - AWS Cognito User Pools or Identity Pools: what do I use to secure my API?
David García
byDavid García@Da_vidgf
    byDavid García@Da_vidgf

    AWS/Serverless Developer

David García
    byDavid García@Da_vidgf

    AWS/Serverless Developer

← Previous

Canary deployments in Serverless applications

About Author

David García HackerNoon profile picture
David García@Da_vidgf

AWS/Serverless Developer

Read my storiesAbout @Da_vidgf

Comments

avatar

TOPICS

cloud#aws#aws-cognito#authentication#api#aws-cognito-user-pools

THIS ARTICLE WAS FEATURED IN

Arweave
viewblock
ViewBlock
TerminalTerminalLiteLite
Blogspot
Aryan

Related Stories

Story image

Untitled Story

Author

HackerNoon Writer

Canary deployments in Serverless applications
#AWS

Canary deployments in Serverless applications

David

David

Feb 26, 2018

100 Days of AI Day 1: From Newsletter to Podcast, Leveraging AI for Audio Transformation
#AI

100 Days of AI Day 1: From Newsletter to Podcast, Leveraging AI for Audio Transformation

Nataraj

Nataraj

Jan 04, 2024

10 Threats to an Open API Ecosystem
#API

10 Threats to an Open API Ecosystem

Michael

Michael

Jul 18, 2022

10 Indications That You Should Invest in Automation Via APIs
#API

10 Indications That You Should Invest in Automation Via APIs

apilayer

apilayer

Jan 31, 2022

10 Best Practices for Securing Your API
#API-SECURITY

10 Best Practices for Securing Your API

Misbah

Misbah

Feb 14, 2023

/undefined feature image

/undefined feature image
author
byHackerNoon Writer
/canary-deployments-in-serverless-applications-b0f47fa9b409 feature image

Canary deployments in Serverless applications

/canary-deployments-in-serverless-applications-b0f47fa9b409 feature image
author
byDavid@Da_vidgf
#AWS
/100-days-of-ai-day-1-from-newsletter-to-podcast-leveraging-ai-for-audio-transformation feature image

100 Days of AI Day 1: From Newsletter to Podcast, Leveraging AI for Audio Transformation

/100-days-of-ai-day-1-from-newsletter-to-podcast-leveraging-ai-for-audio-transformation feature image
author
byNataraj@sindamnataraj
#AI
/10-threats-to-an-open-api-ecosystem feature image

10 Threats to an Open API Ecosystem

/10-threats-to-an-open-api-ecosystem feature image
author
byMichael@MichaelB
#API
/10-indications-that-you-should-invest-in-automation-via-apis feature image

10 Indications That You Should Invest in Automation Via APIs

/10-indications-that-you-should-invest-in-automation-via-apis feature image
author
byapilayer@apilayer
#API
/10-best-practices-for-securing-your-api feature image

10 Best Practices for Securing Your API

/10-best-practices-for-securing-your-api feature image
author
byMisbah@misbahnishan
#API-SECURITY

Light-Mode

Classic

Newspaper

Dark-Mode

Neon Noir

Minty

HN StartUps