-
Notifications
You must be signed in to change notification settings - Fork 9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cognito refresh_token_validity does not match what AWS allows #17514
Comments
Just realized I was on older versions. Just updated and issue persists:
|
|
Doing some more research, I found a an issue on the Cloudformation Github That shows you can set it to use |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform CLI and Terraform AWS Provider Version
Terraform v0.14.4
Affected Resource(s)
Terraform Configuration Files
Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation.
Expected Behavior
According to AWS docs, we should be able to go from 60 minutes, all the way up to 10 years.
Actual Behavior
Only able to set the number in days
References
https://aws.amazon.com/about-aws/whats-new/2020/08/amazon-cognito-user-pools-supports-customization-of-token-expiration/
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cognito_user_pool_client#refresh_token_validity
The text was updated successfully, but these errors were encountered: