Admin Link Provider For User
cognitoidentityprovider_admin_link_provider_for_user | R Documentation |
Links an existing user account in a user pool, or DestinationUser, to an identity from an external IdP, or SourceUser, based on a specified attribute name and value from the external IdP¶
Description¶
Links an existing user account in a user pool, or DestinationUser
, to
an identity from an external IdP, or SourceUser
, based on a specified
attribute name and value from the external IdP.
This operation connects a local user profile with a user identity who
hasn't yet signed in from their third-party IdP. When the user signs in
with their IdP, they get access-control configuration from the local
user profile. Linked local users can also sign in with SDK-based API
operations like initiate_auth
after they sign in at least once through
their IdP. For more information, see Linking federated
users.
The maximum number of federated identities linked to a user is five.
Because this API allows a user with an external federated identity to sign in as a local user, it is critical that it only be used with external IdPs and linked attributes that you trust.
Amazon Cognito evaluates Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you must use IAM credentials to authorize requests, and you must grant yourself the corresponding IAM permission in a policy.
Learn more
Usage¶
cognitoidentityprovider_admin_link_provider_for_user(UserPoolId,
DestinationUser, SourceUser)
Arguments¶
UserPoolId |
[required] The ID of the user pool where you want to link a federated identity. |
DestinationUser |
[required] The existing user in the user pool that you want to assign to the external IdP user account. This user can be a local (Username + Password) Amazon Cognito user pools user or a federated user (for example, a SAML or Facebook user). If the user doesn't exist, Amazon Cognito generates an exception. Amazon Cognito returns this user when the new user (with the linked IdP attribute) signs in. For a native username + password user, the
The The All attributes in the DestinationUser profile must be mutable. If you have assigned the user any immutable custom attributes, the operation won't succeed. |
SourceUser |
[required] An external IdP account for a user who doesn't exist yet in the user pool. This user must be a federated user (for example, a SAML or Facebook user), not another native user. If the For OIDC, the The following additional considerations apply to
|
Value¶
An empty list.
Request syntax¶
svc$admin_link_provider_for_user(
UserPoolId = "string",
DestinationUser = list(
ProviderName = "string",
ProviderAttributeName = "string",
ProviderAttributeValue = "string"
),
SourceUser = list(
ProviderName = "string",
ProviderAttributeName = "string",
ProviderAttributeValue = "string"
)
)