You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore(cognito-identitypool): update README to encourage least privilege (#31811)
### Issue # (if applicable)
N/A
### Reason for this change
To ensure customers are using the module securely, we want to encourage them to follow the best practice of the principal of least privilege. That is, customers are only providing as much access as necessary to complete the task, and no privileges greater than that.
### Description of changes
* Updated the README to include sentences around the privilege and access granting sections encouraging only giving the least amount of privileges necessary.
* Updated the README example to remove wildcard privilege.
### Description of how you validated changes
`yarn rosetta:extract` passes.
### Checklist
- [x] My code adheres to the [CONTRIBUTING GUIDE](https://github.com/aws/aws-cdk/blob/main/CONTRIBUTING.md) and [DESIGN GUIDELINES](https://github.com/aws/aws-cdk/blob/main/docs/DESIGN_GUIDELINES.md)
----
*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
@@ -253,7 +254,8 @@ new IdentityPool(this, 'myidentitypool', {
253
254
254
255
In addition to setting default roles for authenticated and unauthenticated users, identity pools can also be used to
255
256
define rules to choose the role for each user based on claims in the user's ID token by using Role Mapping. When using
256
-
role mapping, it's important to be aware of some of the permissions the role will need. An in depth
257
+
role mapping, it's important to be aware of some of the permissions the role will need, and that the least privileged
258
+
roles necessary are given for your specific use case. An in depth
257
259
review of roles and role mapping can be found [here](https://docs.aws.amazon.com/cognito/latest/developerguide/role-based-access-control.html).
258
260
259
261
Using a [token-based approach](https://docs.aws.amazon.com/cognito/latest/developerguide/role-based-access-control.html#using-tokens-to-assign-roles-to-users) to role mapping will allow mapped roles to be passed through the `cognito:roles` or
0 commit comments