This is the first in a two-part series where we’ll build a React app using AWS Cognito for email-based user authentication. Part 1 focuses on setting up the necessary AWS configurations, while Part 2 will dive into the React code to tie it all together.
We’ll work with the following AWS services:
- Amazon Simple Email Service (SES)
- AWS Cognito
Let’s start by setting up our AWS resources.
Amazon Simple Email Service (SES)
Domain SES Identity
For testing purposes, verifying domain ownership in SES is optional, as AWS offers a workaround. However, for production, verifying ownership is essential to allow SES to send emails on behalf of your domain.
Here’s the setup process:
- Go to Amazon Simple Email Service.
- Select Identities.
- Click Create Identity.
In the setup, I chose "Domain" and used the example domain.com.
- Click Create identity.
Then, you’ll see a page similar to this one:
Navigate to the Publish DNS records section, and use those values to add the records in your domain provider.
Once the DNS records are set up in your domain provider, you should see your domain verified, looking something like this:
Perfect, your domain is now verified, which allows SES to send emails on your behalf. This verification isn't required for testing since AWS provides an alternate method, but it’s essential for production.
Email SES Identity
When testing, this step is important because the email address you use in your authentication flow needs to be added to AWS's "allow list." Here, we’ll add and verify an email address.
Head to:
- Amazon Simple Email Service
- Identities
- Create identity
This time, select Email address:
- Enter the email address you want to verify.
- Click Create identity.
Once the identity is created, you'll receive an email from AWS containing a verification link. Make sure to check your inbox and click on that link to verify your email.
Once you've verified your email, you should see a label indicating that it's verified.
At this point, you should have both your domain and email verified. While the domain verification is optional during testing, it becomes necessary in production. On the other hand, email verification is required for testing but not for production.
Note: As part of the authentication flow, a confirmation code will be sent to this email account. If the email account is not verified, it won't receive the code.
Amazon Cognito
The last piece to configure is Cognito. This service enables account authentication, and in this case, we'll use email for authentication. Here's how it works:
- The user creates an account with their email and password.
- They verify their email by entering the code sent by AWS.
- Once verified, the user can log in using their email and password.
Instead of handling authentication yourself, you can leverage AWS Cognito.
Let's go to:
Note: For most steps, I'm sticking with the default options, so I'll only mention the custom choices I make. Depending on your project, you may want to configure different settings.
- Cognito
- Create user pool
- Step 1: Check Email
- Step 2: Select No MFA; this isn't necessary for testing.
- Step 3: I kept the default options.
- Step 4: Choose your verified "From email address."
Cognito will send an email with a verification code, ideally from your domain, which is why the domain needs to be verified in the previous section. Here, you can see that AWS offers the option to "Send email with Cognito" which is suitable for development. However, in production, you’ll want to ensure that your domain is verified for a more professional and reliable email sending process.
- Step 5: In addition to adding a pool and client name, the key part is to expand the "Advanced app client settings" and enable ALLOW_USER_PASSWORD_AUTH. This setting allows users to authenticate using their email and password, which is essential for your authentication flow.
- Step 6: This is the review step, and there's nothing to edit here. Just make sure everything looks good before moving forward.
Once created, you should see it on the dashboard like this:
That's it! You now have everything set up on AWS. In the next post, I'll demonstrate how to connect your React app with Cognito to authenticate a user using their email. Look out for the post, which will be published next Monday.
The above is the detailed content of React AWS Cognito: Email Authentication Setup Guide (First Part). For more information, please follow other related articles on the PHP Chinese website!

Detailed explanation of JavaScript string replacement method and FAQ This article will explore two ways to replace string characters in JavaScript: internal JavaScript code and internal HTML for web pages. Replace string inside JavaScript code The most direct way is to use the replace() method: str = str.replace("find","replace"); This method replaces only the first match. To replace all matches, use a regular expression and add the global flag g: str = str.replace(/fi

Leverage jQuery for Effortless Web Page Layouts: 8 Essential Plugins jQuery simplifies web page layout significantly. This article highlights eight powerful jQuery plugins that streamline the process, particularly useful for manual website creation

So here you are, ready to learn all about this thing called AJAX. But, what exactly is it? The term AJAX refers to a loose grouping of technologies that are used to create dynamic, interactive web content. The term AJAX, originally coined by Jesse J

10 fun jQuery game plugins to make your website more attractive and enhance user stickiness! While Flash is still the best software for developing casual web games, jQuery can also create surprising effects, and while not comparable to pure action Flash games, in some cases you can also have unexpected fun in your browser. jQuery tic toe game The "Hello world" of game programming now has a jQuery version. Source code jQuery Crazy Word Composition Game This is a fill-in-the-blank game, and it can produce some weird results due to not knowing the context of the word. Source code jQuery mine sweeping game

Article discusses creating, publishing, and maintaining JavaScript libraries, focusing on planning, development, testing, documentation, and promotion strategies.

This tutorial demonstrates how to create a captivating parallax background effect using jQuery. We'll build a header banner with layered images that create a stunning visual depth. The updated plugin works with jQuery 1.6.4 and later. Download the

This tutorial demonstrates creating dynamic page boxes loaded via AJAX, enabling instant refresh without full page reloads. It leverages jQuery and JavaScript. Think of it as a custom Facebook-style content box loader. Key Concepts: AJAX and jQuery

This JavaScript library leverages the window.name property to manage session data without relying on cookies. It offers a robust solution for storing and retrieving session variables across browsers. The library provides three core methods: Session


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

Atom editor mac version download
The most popular open source editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Dreamweaver Mac version
Visual web development tools

Zend Studio 13.0.1
Powerful PHP integrated development environment
