Integration of AWS Cognito Login ( AWS SSO Cognito ) with Magento using OAuth 2.0 Protocol.
The Magento OAuth / OpenID Connect Single Sign-On (SSO) plugin makes it easy to use OAuth2 to set up AWS Cognito Login on Magento (AWS Cognito Single Sign on).
The plugin can be set up using other Social Media sources, as well as custom OAuth and OIDC providers. It contains a lot of Single Sign-On (SSO) features, like Attribute Mapping for user profiles, Role Mapping, and so on. In this guide, we'll go over how to set up SSO between Magento and AWS Cognito. At the end of this article, users should be able to log into Magento using AWS Cognito. Click here to read more about the Magento OAuth Single Sign-On (OAuth & OpenID Connect Client) plugin's extra features.
The Magento OAuth & OpenID Connect Single Sign-On (SSO) plugin makes it possible to log into Magento securely using AWS Cognito as an OAuth and OpenID Connect provider. You can also use alternative Oauth providers, such as Azure B2C, Office 365, and other custom providers, to configure the plugin. Advanced Single Sign-On features such as user profile Attribute Mapping, Role Mapping, and so on are supported. We'll go over how to set up SSO between Magento and AWS Cognito in this article. Users should be able to log in to Magento through AWS Cognito by the end of this guide.
Click here to know more about other features we provide in Magento OAuth Single Sign-On ( OAuth & OpenID Connect Client ) plugin
Steps to configure AWS Cognito OAuth & OpenID Single Sign-On (SSO) Login into Magento
1. Setup Amazon Cognito as OAuth Provider
Follow the steps below to configure AWS Cognito as OAuth Provider
Configure AWS Cognito as OAuth Provider
Go to Amazon Console and sign up/login in your account to Configure AWS Cognito.
Search for Cognito in the AWS Services search bar.
To see the list of your user pools click on Manage User Pools button.
To make a new user pool, click Create a user pool.
Give a Pool Name and click on the Review Defaults button to continue.
Scroll down and click on “Add app client” & then again click on Add an app client.
To create an App client, type a name for it and then click Create app client.
To return to your setup, click Return to Pool Details.
To save your settings and establish a user pool, click the Create Pool button.
In the navigation bar present on the left side, click on the App Client Settings option under the App Integration menu.
Under the CallBack URLs text-field, enable Identity provider as Cognito user pool and add your Callback/Redirect URL obtained from the miniOrange plugin from the OAuth Provider tab. Under the Allowed OAuth Flows option, choose the Authorization code grant checkbox, as well as the openid and profile checkboxes under the Allowed OAuth Scopes option (Please refer to the image below). To save your changes, click the Save Changes button.
To choose a domain name for your app, go to the Choose Domain Name option.
Go to domain name and enter a domain name for your app. After adding domain name you can check its availability by clicking on “Check availability” button. After entering valid domain name click ”Save changes” button.
Go to “App client” and click on “Show details” to get a client ID and client secret. (Keep client ID and client secret handy as you will need it later.)
In the left side navigation bar, select Users and Groups from the General Settings menu. Then, to create a new user, click the Create user button.
Fill all the required details and click on Create user.
You can see the new user created.
You have successfully configured AWS Cognito as OAuth Provider for for achieving AWS Cognito Single Sign-On (SSO) with Magento for user authentication.
2. Configuring Magento 2 as OAuth Client
After successfully configuring OAuth Provider, go to OAuth Provider tab and configure OAuth Provider Name, Client ID, Client Secret, Scope and provided endpoints. (You can copy these values in STEP 2 from the application dashboard.)
Please refer below Endpoints to configure the OAuth client
You will see all the values returned by your OAuth Provider to Magento in a table. If you don't see value for First Name, Last Name, Email or Username, make the required settings in your OAuth Provider to return this information.
3. Sign-In Settings
Navigate to Sign-in Settings tab. Here you find the option the enable the login link on Admin*/Customer Login Page (*Admin SSO is available in the premium versions)
If you want to initate SSO from any page you can also use the SSO link provided in the extension.
The Premium extension also provides you the the feature to auto redirect your user to the IdP Login Page if the user is not already logged in.
Go to customer login page and you will see the SSO button on your frontend. Click on the button and test the SSO.
You will be sucessfully logged in into Magento.
Visit your admin login page and you will see the SSO button on your admin page. Click on the button to initate SSO as an admin.
After sucessfully logged into magento as admin you will be redirect to magento backend dashboard.
Attribute / Custom Attribute Mapping (Optional). *This is Premium feature.
1.1: Attribute Mapping (Optional). *This is Premium feature.
You can map attributes in the Attribute Mapping tab. Only username and email are allowed to be mapped in free version of the plugin. However, in the premium version of the plugin, you can map various attributes coming from your OAuth Provider to the attributes present in your Magento site.
1.2: Custom Attribute Mapping (Optional). *This is Premium feature.
Enter your table name in Table field.
Enter attribute name as your column name (in the respective table)
Click on Add button for adding custom magento attribute and map the respective field with the attribute receiving from your identity provider
Click on save button for saving the configuration.
You can also delete the configuration by entering the name in attribute name field and then click on delete button.
Role Mapping (Optional). *This is Premium feature.
You can specify a default role in the free plugin that will be allocated to all non-admin users when they conduct SSO.
Go to Attribute/Role mapping tab and navigate to Role Mapping section.
Select the Default Role and click on the Save button.
By configuring AWS Cognito as an OAuth Provider and Magento as an OAuth Client using our Magento OAuth Client plugin, you have successfully installed Magento AWS Cognito Single Sign-On (SSO). Within minutes, you'll be able to provide safe access to your Magento site utilising AWS Cognito login credentials thanks to this solution.
If you dont hear from us within 24 hours, please feel free to send a follow up email to email@example.com
This privacy statement applies to miniorange websites describing how we handle the personal
When you visit any website, it may store or retrieve the information on your browser, mostly in the
form of the cookies. This information might be about you, your preferences or your device and is
mostly used to make the site work as you expect it to. The information does not directly identify
you, but it can give you a more personalized web experience.
Click on the category headings to check how we handle the cookies.
Strictly Necessary Cookies
Necessary cookies help make a website fully usable by enabling the basic functions like site
navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any
personal identifiable information. However, some parts of the website will not work properly without
These cookies only collect aggregated information about the traffic of the website including -
visitors, sources, page clicks and views, etc. This allows us to know more about our most and least
popular pages along with users' interaction on the actionable elements and hence letting us improve
the performance of our website as well as our services.