AWS Cognito OAuth & OpenID connect Single Sign-On (SSO) | AWS Cognito SSO Login



AWS Cognito Single Sign-On (SSO) enables secure login into a WordPress site using WordPress OAuth & OpenID Connect Single Sign-On (SSO) plugin. You can also configure plugin using different custom providers and standard IDPs. It supports advanced Single Sign-On (SSO) features such as user profile Attribute mapping, Role mapping, etc. Here we will go through a guide to configure Single Sign-On (SSO) between WordPress and AWS Cognito. By the end of this guide, users should be able to login to WordPress using AWS Cognito SSO. To know more about other features we provide in WP OAuth Single Sign-On ( OAuth & OpenID Connect Client ) plugin, you can click here.

Download And Installation

  • Log into your WordPress instance as an admin.
  • Go to the WordPress Dashboard -> Plugins and click on Add New.
  • Search for a WordPress OAuth Single Sign-On (SSO) plugin and click on Install Now.
  • Once installed click on Activate.

Steps to configure AWS Cognito Single Sign-On (SSO) Login into WordPress

Step 1: Setup Amazon Cognito as OAuth Provider

  • First of all, go to Amazon Console and sign up/login in your account to Configure AWS Cognito.
  • Amazon Single Sign-On (SSO) Login to Amazon Console
  • Search for Cognito in the AWS Services search bar as shown below.
  • Amazon Cognito Single Sign-On (SSO) Search for AWS Cognito
  • Click on Mange User Pools button to see the list of your user pools.
  • AWS SSO, OAuth/OpenID Cognito Single Sign-On (SSO) AWS Cognito User Pools
  • Click on Create a user pool to create a new user pool.
  • Cognito SSO, OAuth/OpenID Amazon Single Sign-On (SSO) Create New AWS Cognito Pool
  • Add a Pool Name and click on the Review Defaults button to continue.
  • AWS SSO, OAuth/OpenID Amazon Cognito Single Sign-On SSO Name your AWS Cognito User Pool
  • Scroll down and click on the Add App Client option in front of App Clients.
  • AWS Single Sign-On (SSO) AWS Cognito App Client
  • Click on Add an App Client. Enter an App Client Name and click on Create app client to create an App client.
  • Cognito Single Sign-On (SSO) Create App Client
  • Click on Return to Pool Details to come back to your configuration.
  • AWS SSO Configure AWS Cognito Pool
  • Click on Create Pool button to save your settings and create a user pool.
  • AWS Single Sign-On (SSO) Save AWS Cognito Pool
  • In the navigation bar present on the left side, click on the App Client Settings option under the App Integration menu.
  • OAuth/OpenID Amazon Cognito Single Sign-On (SSO) AWS Cognito App Details
  • Enable Identity provider as Cognito user pool and enter your Callback/Redirect URL which you will get from your miniOrange plugin present on your Client side under the CallBack URLs text-field. Select Authorization code grant checkbox under the Allowed OAuth Flows and also select openid and profile checkboxes under the Allowed OAuth Scopes option (Please refer to the image below). Click on the Save Changes button to save your configurations.
  • AWS SSO, OAuth/OpenID AWS Cognito Single Sign-On (SSO) Configure AWS Cognito App Client
  • Click on Choose Domain Name option to set a domain name for your app.
  • OAuth/OpenID AWS Single Sign-On (SSO) AWS Cognito Domain Names
  • Enter your Domain Name under the Domain Prefix text-field and click on the Save Changes button to save your domain name.
  • OAuth/OpenID AWS SSO Configure AWS Cognito Domain Name
  • Click on App Clients option under the General Settings menu in the left side navigation bar. Then, click on the Show Details button to see your App details like Client ID, Client secret etc.
  • AWS Single Sign-On (SSO) AWS Cognito App Client Details
  • Copy the Client App ID and Client App Secret text field values and save them under your miniOrange plugin present on the client side under the Client Id and the Client Secret text fields respectively.
  • AWS Cognito Single Sign-On (SSO) AWS Cognito App Client Configuration
  • Click on Users and groups option under the General Settings menu in the left side navigation bar. Then, click on the Create user button to add a new user.
  • Cognito Single Sign-On (SSO) AWS Cognito App New User Creation
  • Fill all the required details and click on Create user.
  • AWS Single Sign-On (SSO) AWS Cognito App Client Configuration
  • You can see the new user created.
  • AWS Single Sign-On (SSO) AWS Cognito App Client Configuration

    AWS Cognito Endpoints and Scope:


    Client ID : Click Here
    Client Secret : Click Here
    Scope: openid
    Authorize Endpoint: https://<cognito-app-domain>/oauth2/authorize
    Access Token Endpoint: https://<cognito-app-domain>/oauth2/token
    Get User Info Endpoint: https://<cognito-app-domain>/oauth2/userInfo
    Custom redirect URL after logout:[optional] https://<cognito-app-domain>/logout?client_id=<Client-ID>&logout_uri=<Sign out URL configured in Cognito Portal>

You have successfully configured AWS Cognito as OAuth Provider for achieving AWS Cognito login into your WordPress Site.

Step 2: Setup WordPress as OAuth Client

  • After Plugin is activated, go to the plugin and search for AWS Cognito. Select AWS Cognito from the OAuth Providers list.
  • AWS SSO, cognito single sign-on select Amazon Cognito as OAuth Provider
  • To configure AWS Single Sign-On (SSO), go to Configure OAuth tab and configure App Name, Client ID, Client Secret from provided Endpoints.
  • openid is already filled but if it doesn't work then configure scope as User.Read and for fetching group info use scope is Directory.read.all.
  • Click on Save Settings to save the configuration.
  • AWS Single Sign-On SSO, Cognito SSO save settings

You have successfully configured WordPress as OAuth Client for achieving AWS Cognito login into your WordPress Site.

Step 3: User Attribute Mapping.

  • User Attribute Mapping is mandatory for enabling users to successfully Single Sign-On into WordPress using AWS SSO. We will be setting up user profile attributes for WordPress using the below settings.
  • Finding user attributes

    • Go to Configure OAuth tab. Scroll down and click on Test Configuration.
    • AWS SSO, OAuth/OpenID Amazon Cognito Single Sign-On SSO test congifuration
    • You will see all the values returned by your OAuth Provider to WordPress in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
    • AWS SSO, OAuth/OpenID Amazon Cognito Single Sign-On SSO test congifuration result
    • Once you see all the values in Test Configuration, go to Attribute / Role Mapping tab, select attributes from Username dropdown and click on Save.
    • AWS SSO, OAuth/OpenID Amazon Cognito Single Sign-On SSO attribute/role mapping

Step 4: Login Settings / Sign In Settings.

  • The settings in Single Sign-On (SSO) Settings tab define the user experience for Single Sign-On (SSO). To add a AWS SSO login widget on your WordPress page, you need to follow the below steps.
  • Sign In Settings

    • Go to WordPress Left Panel > Appearances > Widgets.
    • Select miniOrange OAuth. Drag and drop to your favourite location and save.
    • AWS Single Sign-On(SSO): login button setting
    • Open your WordPress page and you can see the AWS SSO login button there. You can test the AWS Single Sign-On (SSO) now.

    In this Guide, you have successfully configured AWS Cognito Single Sign-On (SSO) by configuring AWS Cognito as OAuth Provider and WordPress as OAuth Client using our WP OAuth Single Sign-On ( OAuth / OpenID Connect Client ) plugin.This solution ensures that you are ready to roll out secure access to your WordPress site using AWS Cognito login credentials within minutes.

Need Help?

Mail us on oauthsupport@xecurify.com for quick guidance(via email/meeting) on your requirement and our team will help you to select the best suitable solution/plan as per your requirement.


Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com