IN THIS ARTICLE
Setting Up the AWS Client Auth Gem
The AWS Client Auth Gem requires the following to be installed and configured:
- AWS Cloud Development Kit (CDK)
- AWS credentials
- O3DE AWS Core Gem
The AWS Command Line Interface (CLI) (version 2) is optional but also strongly recommended.
See Getting Started with AWS Gems for help with installing and configuring these prerequisites.
Complete the following set up steps to use the AWS Client Auth Gem in your project:
- Enable the AWS Client Auth Gem in your project.
- Configure project settings.
- Deploy the CDK application.
- Update the resource mapping file to use the deployed AWS resources.
If you haven’t already added and built the AWS Client Auth Gem in your project, do so now using the instructions in Enabling the AWS Client Auth Gem .
For this step, decide which authentication provider you will use and configure your project to use that provider by following the steps in Using Authentication Providers . You can use one of the supported providers, or extend the Gem to support your own.
Use the CDK synth and deploy commands from the AWS Client Auth Gem directory to deploy AWS resources for authentication and authorization support. For help with these deployment operations, refer to the synth and deploy steps in Deploying the CDK Application in the AWS Core documentation.
When setting constants for deploy, the AWS Client Auth Gem supports the following additional, optional values. If set, the CDK application will try to enable the authenticated provider authorization using the Amazon Cognito identity pool.
GOOGLE_APP_CLIENT_ID: Google app client ID to enable Google-authenticated authorization in Amazon Cognito identity pool.
LOGIN_WITH_AMAZON_APP_CLIENT_ID: Login with Amazon (LWA) app client ID to enable LWA-authenticated authorization in Amazon Cognito identity pool.
You can use deployment scripts to set these environment variables.
After a successful deployment, the following resources are provisioned.
Groups all resources provisioned for AWS Client Auth Gem. Deleting stack will delete all resources from AWS Client Auth stack.
CognitoUserPoolSMSRole: Allows Amazon Cognito user pool to send SMS messages for sign up and MFA.
Authenticated CognitoIdentityPoolRole: Provides permission to authenticated clients by providing credentials associated with the managed policy attached to this role.
Anonymous CognitoIdentityPoolRole: Provides permission to anonymous clients by providing credentials associated with the managed policy attached to this role.
Create user pool with email/phone sign up enabled, SMS_MFA enabled and optional.
Create identity pool to support authenticated and anonymous identities.
- Amazon Cognito user pool: Use the created user pool for authentication.
- Google: Use Google authentication provider for authentication.
- Login With Amazon: Use LWA authentication provider for authentication.
After deploying the CDK application, your project’s resource mapping file must be updated to export the deployed REST API information so that you can use the deployed AWS resources.
Use the Resource Mapping Tool to add the following mappings to your project’s resource mapping file:
Copyright © 2022 Open 3D Engine Contributors
Documentation Distributed under CC BY 4.0.
The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our Trademark Policy page.