Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Cognito connector uses OpenID Connect to federate authentication with Amazon Cognito and supports standard OIDC flows — allowing you to bridge Cognito user pools with applications that don’t natively support modern identity protocols.Use Cases
- Unify SSO for AWS-native workloads — Extend Cognito user pool authentication to legacy and non-AWS applications, creating a consistent SSO experience across your AWS and hybrid environments
- Rationalize away from Cognito — Gradually migrate users from Cognito to an enterprise IdP like Microsoft Entra ID or Okta without downtime, reducing the complexity of maintaining separate identity stores
- Hybrid cloud identity orchestration — Route authentication across Cognito and enterprise identity providers based on application context, unifying access for organizations with multi-cloud deployments
- AWS application resilience — Configure Cognito as a failover IdP for AWS-hosted applications, ensuring authentication continuity even when the primary identity provider is unavailable
Setup
- Console UI
- Configuration
To create an Amazon Cognito (OIDC) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Amazon Cognito (OIDC).
- Enter a Name for the connector — this is the friendly name that identifies your Cognito integration.
- Enter the OIDC Well Known URL for your Cognito user pool. This follows the pattern
https://cognito-idp.{region}.amazonaws.com/{user-pool-id}/.well-known/openid-configuration— replace{region}with your AWS region (e.g.,us-east-1) and{user-pool-id}with the Cognito user pool ID from the AWS Console. - Enter the OAuth Client ID — the app client ID from your Cognito user pool’s App integration settings.
- Enter the OAuth Client Secret — the app client secret associated with the client ID. Use the show/hide toggle to verify the value.
- Add one or more Redirect URLs — the callback URL(s) where Cognito redirects users after authentication. The Maverics OIDC handler will be served on this URL.
- Optionally add Logout Callback URLs — the URL(s) that Cognito calls after a successful logout.
- Optionally enter Scopes — space-separated OIDC scopes to request (e.g.,
openid profile email). If left empty, default scopes are used. - Proof Key for Code Exchange (PKCE) is enabled by default. Disable this toggle only if your Cognito app client is not configured to support PKCE.
- Optionally enable Offline Access if you need refresh tokens. When enabled, set your policy’s
decision.lifetimeslightly longer than the interval for token refreshing. - Click Save.
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — ensure the AWS region and user pool ID are correct - Ensure the
oauthRedirectURLmatches exactly what is registered in the Cognito app client under Allowed callback URLs - Check that the client secret reference resolves correctly via your secret provider — ensure the Cognito app client is configured to generate a client secret