ios - Unauthenticated identites not mapping to Developer Authenticated Identity -


when user launches app unauthenticated user , receive unauthenticated cognito identity supplied developerauthenticatedidentityprovider class in ios app. can see unauthenticated cognito identity in cognito console. however, when login , make call nodejs backend logins map of:

{    devauthidentitylogin:<username> } 

and using backend code:

getcognitoidentity: function(logins, cognitoid, error) {         var cognitoidentity = new aws.cognitoidentity(awsoptions);          var params = {             identitypoolid: identitypool,             logins: logins,             tokenduration: (60 * 5)         };          cognitoidentity.getopenidtokenfordeveloperidentity(params, function(err, data) {             if (err) {                 console.log(err, err.stack);                 error(err)             } else {                 console.log(data);           // successful response                 cognitoid(data);             }         });     } 

it creates new identity id developer authenticated identity , can see in cognito console, old unauthenticated 1 not being mapped new developer authenticated one.

do need supply unauthenticated identity id in logins map when making call backend associate two? or not making call correctly. need clarification on how map/merge these identities please.

i answered question on our forums, need include unauth identitity id parameter getopenidtokenfordeveloperidentity call, otherwise amazon cognito have no way of knowing should associate user identifier identity.


Comments

Popular posts from this blog

Fail to load namespace Spring Security http://www.springframework.org/security/tags -

sql - MySQL query optimization using coalesce -

unity3d - Unity local avoidance in user created world -