Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ERROR invalid-user-claim on AWS cognito #265

Closed
Emanuele-iltk opened this issue Jan 26, 2021 · 6 comments
Closed

ERROR invalid-user-claim on AWS cognito #265

Emanuele-iltk opened this issue Jan 26, 2021 · 6 comments
Assignees
Labels
documentation Issues related to documentation changes or fixes.

Comments

@Emanuele-iltk
Copy link

identity provider: aws cognito
wordpress version: 5.6
php version: 7.4

i’m using aws cognito for my sso
the connection with cognito is working,
but when i insert my data for login, the site respond ERROR invalid user claim
immagine

would it be possipble that the error is the identity or nickname key?
now i insertd the examples values
oter parametres are:
Scope: openid
Login Endpoint URL: my.domain.org/oauth2/authorize
Userinfo Endpoint URL: my.domain.org/oauth2/UserInfo
Token Validation Endpoint URL: my.domain.org/oauth2/token: my.domain.org/oauth2/logout
Disable SSL Verify: true
Email Formatting: {email}
Display Name Formatting: {family_name}
Identify with User Name: false
Link Existing Users: true
Create user if does not exist: true

any suggestion for fix the problem?

thank
Emanuele

@timnolte timnolte added needs analysis Issues needing further investigation to the cause and/or change required. need more info Issues needing more information from the author. and removed need more info Issues needing more information from the author. labels Jan 29, 2021
@timnolte
Copy link
Collaborator

@Emanuele-iltk so as I was looking the AWS Cognito documentation it looks like this may be related to the requirement that Basic Authorization is to be used with AWS Cognito but the plugin currently only supports POST Authorization. There is an open issue reporting this for another IDP. I might see about setting up an AWS Cognito instance for further testing as well to confirm this. I did a quick Google and found this guide on setting up AWS Cognito as an OIDC IDP. I'm wondering if you can check that guide against your setup and see if there is a misconfiguration?

@timnolte timnolte self-assigned this Jan 29, 2021
@jamiewildehk
Copy link

@Emanuele-iltk I ran into the same issue - have you tried setting your userInfo path to use a lower case U:

/oauth2/userInfo

This worked for me.

@timnolte
Copy link
Collaborator

timnolte commented Apr 7, 2021

@Emanuele-iltk so I did setup my own AWS Cognito instance and have this working properly. I will provide some documentation guidance in the wiki for this IDP soon.

@jamiewildehk
Copy link

I am using the plugin with Cognito in production with mostly fine results. (a couple of "Invalid State" messages - 180 seconds default is not long enough for many users to validate their email during sign up)

@timnolte timnolte added need more info Issues needing more information from the author. and removed needs analysis Issues needing further investigation to the cause and/or change required. labels Apr 9, 2021
@sarfrazhooda1
Copy link

Have you published cognito instructions? I looked through wiki but couldn't find anything. I have configured everything but I get error when I click on the login button. In console I see 403 error

cognito

@timnolte
Copy link
Collaborator

@sarfrazhooda1 I haven't had a chance to update the wiki yet. I need to focus on some redirect & bug fixes. I should be able to get something documented soon.

@timnolte timnolte added documentation Issues related to documentation changes or fixes. and removed bug need more info Issues needing more information from the author. labels Feb 25, 2022
@timnolte timnolte closed this as completed May 6, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Issues related to documentation changes or fixes.
Projects
None yet
Development

No branches or pull requests

4 participants