Amazon Cognito User Pool
By default, Bedrock Chat uses Amazon Cognito User Pool for authentication. Users can sign up and sign in using email addresses.Self Sign-Up Configuration
Control whether users can register their own accounts.Enable or disable self-registration for new users. When disabled, administrators must create user accounts manually through the Cognito console.
Email Domain Restrictions
Restrict sign-ups to specific email domains.List of email domains allowed for sign-up. Empty array allows all domains.
@example.com or @company.org email addresses.
User Pool Domain Prefix
Globally unique domain prefix for the Cognito User Pool. Required when using external identity providers.
Auto-Join User Groups
List of Cognito user groups that new users automatically join upon registration.
- CreatingBotAllowed: Grants permission to create custom bots
- Admin: Provides administrative access
- PublishAllowed: Enables bot API publishing
Google OAuth Integration
Integrate Google as an external identity provider.Step 1: Create Google OAuth 2.0 Client
- Go to the Google Developer Console
- Create a new project or select an existing one
- Navigate to Credentials > Create Credentials > OAuth client ID
- Configure the consent screen if prompted
- Select Web application as the application type
- Leave the redirect URI blank initially (will be configured after deployment)
- Note the Client ID and Client Secret
Step 2: Store Credentials in AWS Secrets Manager
- Open AWS Secrets Manager in the console
- Choose Store a new secret
- Select Other type of secrets
- Add the following key-value pairs:
- Key:
clientId, Value: Your Google Client ID - Key:
clientSecret, Value: Your Google Client Secret
- Key:
- Name the secret (e.g.,
googleOAuthCredentials) - Store the secret
Step 3: Configure Identity Provider
List of external identity provider configurations.
Step 4: Deploy and Update Redirect URI
After deploying, retrieve theAuthApprovedRedirectURI from CloudFormation outputs and add it to your Google OAuth client’s authorized redirect URIs.
Custom OIDC Provider
Integrate any OIDC-compliant identity provider.Step 1: Obtain OIDC Credentials
Follow your OIDC provider’s procedures to obtain:- Client ID
- Client Secret
- Issuer URL
Step 2: Store Credentials in AWS Secrets Manager
- Open AWS Secrets Manager
- Choose Store a new secret
- Select Other type of secrets
- Add the following key-value pairs:
- Key:
clientId, Value: Your OIDC Client ID - Key:
clientSecret, Value: Your OIDC Client Secret - Key:
issuerUrl, Value: Your OIDC Issuer URL
- Key:
- Name the secret (e.g.,
oidcCredentials) - Store the secret
Step 3: Configure Identity Provider
Configure in cdk.json:Identity provider type. Use
"google" or "oidc".Display name for custom OIDC provider. Only used when service is
"oidc".Name of the AWS Secrets Manager secret containing provider credentials.
Step 4: Deploy and Update Redirect URI
After deployment, retrieve theAuthApprovedRedirectURI from CloudFormation outputs and configure it in your OIDC provider.
Token Configuration
ID token validity period in minutes. Determines how often users need to refresh their authentication.