Closed leosoaivan closed 4 years ago
Closing this, as I was able to resolve this by adding schema-level directives to my schema.graphql
@leosoaivan how did you add schema-level directives to schema?
Just an update on the link. It is now here: https://docs.aws.amazon.com/appsync/latest/devguide/security-authz.html#using-additional-authorization-modes
I've run into an issue where having an additional authentication provider is causing authorization errors for all authentication types.
I started with an AMAZON_COGNITO_USER_POOLS setup hooked up to AppSync to call two GraphQL operations, a simple user profile query and an update user profile mutation, both connected to a DynamoDB table.
After provisioning an Identity Pool to federate LinkedIn users and setting a
additionalAuthenticationProviders
withAWS_IAM
, I'm running into a bizarre scenario due to 'unauthorized access':Not surprisingly, if I only set one authentication type, either COGNITO or AWS_IAM, the respective GraphQL operations work.
I should mention that my team initially started with AWS Amplify, but moved to provisioning a lot of our own resources via Serverless, as the CloudFormation bits of Amplify were really hard to work with.
Any insight would be appreciated.