Jan. 11, 2024, 8:46 p.m. | Edward Sun

AWS Security Blog aws.amazon.com

With Amazon Cognito, you can implement customer identity and access management (CIAM) into your web and mobile applications. You can add user authentication and access control to your applications in minutes. In this post, I introduce you to the new access token customization feature for Amazon Cognito user pools and show you how to use […]

access access control access management access token access tokens amazon amazon cognito amazon cognito user pools applications authentication best practices ciam cognito compliance control customer customer identity customization feature identity identity and access identity and access management intermediate (200) management mobile mobile applications security security blog technical how-to token tokens web

More from aws.amazon.com / AWS Security Blog

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Technical Support Specialist (Cyber Security)

@ Sigma Software | Warsaw, Poland

OT Security Specialist

@ Adani Group | AHMEDABAD, GUJARAT, India

FS-EGRC-Manager-Cloud Security

@ EY | Bengaluru, KA, IN, 560048