Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

InvalidIdentityPoolConfigurationException: Missing credentials in config #4

Closed
lucascanavan opened this issue Jul 1, 2015 · 4 comments

Comments

@lucascanavan
Copy link

Hi Danilo,

Nice repo! :)

However, I can't seem to get it working on my AWS account. I keep getting the following error even on the sigup page:

"InvalidIdentityPoolConfigurationException: Missing credentials in config"

http://lambdauth.lucas-canavan.net/signup.html

Any ideas???

Thanks,
Lucas

@lucascanavan
Copy link
Author

I noticed that the IAM roles associated with my Cognito identiy pool didn't look right so I updated the role associations to what I believe it's supposed to be be and it started working! :)

@luandro
Copy link

luandro commented May 6, 2016

@lucascanavan could you tell me what the roles associated with my Cognito identiy pool are, and what were the updated you needed to do?

@WebVRRollerCoaster
Copy link

@lucascanavan I too would like to know how you were able to fix this as well, I am having the same issue

@0xdevalias
Copy link

I ran into this recently, and for me (since this issue was at the top of my google search), the issue was that my assume role action was sts:AssumeRole when it needed to be sts:AssumeRoleWithWebIdentity. The error message was rather ambiguous.

I'm using AWS CDK, so what I ended up with looked like:

const authenticatedCognitoFederatedPrincipal = new iam.FederatedPrincipal("cognito-identity.amazonaws.com", {
    "StringEquals": {
        "cognito-identity.amazonaws.com:aud": identityPool.identityPoolId
    },
    "ForAnyValue:StringLike": {
        "cognito-identity.amazonaws.com:amr": "authenticated"
    }
}, "sts:AssumeRoleWithWebIdentity");

const unauthenticatedCognitoFederatedPrincipal = new iam.FederatedPrincipal("cognito-identity.amazonaws.com", {
    "StringEquals": {
        "cognito-identity.amazonaws.com:aud": identityPool.identityPoolId
    },
    "ForAnyValue:StringLike": {
        "cognito-identity.amazonaws.com:amr": "unauthenticated"
    }
}, "sts:AssumeRoleWithWebIdentity");

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants