You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You need to now inform your external provider of the newly configured authentication resource and its OAuth redirect URI:
154
192
155
193
<BlockSwitcher>
@@ -220,6 +258,8 @@ You need to now inform your external provider of the newly configured authentica
220
258
221
259
You can determine the pieces of data you want to retrieve from each external provider when setting them up in the `amplify/auth/resource.ts` file using `scopes`.
You can map which attributes are mapped between your external identity provider and your users created in Cognito. We will be able to have the best level of protection for developers if we ensure that attribute mappings that would not work are called out by the type system.
@@ -252,6 +316,8 @@ If you specify an attribute in your authentication resource as required, and it
-[Learn more about configuring the React Authenticator component for external providers](https://ui.docs.amplify.aws/react/connected-components/authenticator/configuration#external-providers)
To setup a OIDC provider, you can configure them in your `amplify/auth/resource.ts` file. For example, if you would like to setup a Microsoft EntraID provider, you can do so as follows:
Use the `signInWithRedirect` API to initiate sign-in with an OIDC identity provider.
@@ -328,6 +453,8 @@ await signInWithRedirect({
328
453
329
454
To setup a SAML provider, you can configure them in your `amplify/auth/resource.ts` file. For example, if you would like to setup a Microsoft EntraID provider, you can do so as follows:
Use the `signInWithRedirect` API to initiate sign-in with a SAML identity provider.
@@ -472,7 +626,6 @@ import { signInWithRedirect } from 'aws-amplify/auth';
472
626
signInWithRedirect({
473
627
provider: 'Apple'
474
628
});
475
-
476
629
```
477
630
478
631
### Redirect URLs
@@ -483,7 +636,6 @@ _Sign in_ & _Sign out_ redirect URL(s) are used to redirect end users after the
483
636
If you have multiple sign out redirect URLs configured, you may choose to override the default behavior of selecting a redirect URL and provide the one of your choosing when calling `signOut`. The provided redirect URL should match at least one of the configured redirect URLs. If no redirect URL is provided to `signOut`, the first item from the the configured redirect URLs list that does not contain a HTTP nor HTTPS prefix will be picked.
484
637
485
638
```ts
486
-
import { Amplify } from'aws-amplify';
487
639
import { signOut } from'aws-amplify/auth';
488
640
489
641
// Assuming the following URLS were provided manually or via the Amplify configuration file,
@@ -492,10 +644,9 @@ import { signOut } from 'aws-amplify/auth';
<Callout> Irrespective of whether a `redirectUrl` is provided to `signOut`, a URL that does not contain http or https is expected to be present in the configured redirect URL list. This is because iOS requires an appScheme when creating the web session. </Callout>
0 commit comments