AWS Lambda to use caller identity












0















In a mobile App, I want a lambda function to be able to access only rows in the DynamoDB where the key is the userId which calls the Lambda.
I've set the below policy, but I keep getting



User: arn:aws:sts::XXX:assumed-role/FederatedIdentityRole/CognitoIdentityCredentials is not authorized to perform: dynamodb:GetItem on resource: arn:aws:dynamodb:us-east-1:XXX:table/UserData


Any hints are welcome.
Thanks



Below is the Lambda's policy:



{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:BatchWriteItem",
"dynamodb:PutItem",
"dynamodb:GetItem",
"dynamodb:Query",
"dynamodb:UpdateItem"
],
"Resource": [
"arn:aws:dynamodb:us-east-1:XXX:table/UserData"
],
"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": "${cognito-identity.amazonaws.com:sub}"
}
}
}









share|improve this question























  • Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

    – K Mo
    Nov 28 '18 at 8:42











  • Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

    – Hanch
    Dec 11 '18 at 20:58
















0















In a mobile App, I want a lambda function to be able to access only rows in the DynamoDB where the key is the userId which calls the Lambda.
I've set the below policy, but I keep getting



User: arn:aws:sts::XXX:assumed-role/FederatedIdentityRole/CognitoIdentityCredentials is not authorized to perform: dynamodb:GetItem on resource: arn:aws:dynamodb:us-east-1:XXX:table/UserData


Any hints are welcome.
Thanks



Below is the Lambda's policy:



{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:BatchWriteItem",
"dynamodb:PutItem",
"dynamodb:GetItem",
"dynamodb:Query",
"dynamodb:UpdateItem"
],
"Resource": [
"arn:aws:dynamodb:us-east-1:XXX:table/UserData"
],
"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": "${cognito-identity.amazonaws.com:sub}"
}
}
}









share|improve this question























  • Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

    – K Mo
    Nov 28 '18 at 8:42











  • Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

    – Hanch
    Dec 11 '18 at 20:58














0












0








0








In a mobile App, I want a lambda function to be able to access only rows in the DynamoDB where the key is the userId which calls the Lambda.
I've set the below policy, but I keep getting



User: arn:aws:sts::XXX:assumed-role/FederatedIdentityRole/CognitoIdentityCredentials is not authorized to perform: dynamodb:GetItem on resource: arn:aws:dynamodb:us-east-1:XXX:table/UserData


Any hints are welcome.
Thanks



Below is the Lambda's policy:



{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:BatchWriteItem",
"dynamodb:PutItem",
"dynamodb:GetItem",
"dynamodb:Query",
"dynamodb:UpdateItem"
],
"Resource": [
"arn:aws:dynamodb:us-east-1:XXX:table/UserData"
],
"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": "${cognito-identity.amazonaws.com:sub}"
}
}
}









share|improve this question














In a mobile App, I want a lambda function to be able to access only rows in the DynamoDB where the key is the userId which calls the Lambda.
I've set the below policy, but I keep getting



User: arn:aws:sts::XXX:assumed-role/FederatedIdentityRole/CognitoIdentityCredentials is not authorized to perform: dynamodb:GetItem on resource: arn:aws:dynamodb:us-east-1:XXX:table/UserData


Any hints are welcome.
Thanks



Below is the Lambda's policy:



{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:BatchWriteItem",
"dynamodb:PutItem",
"dynamodb:GetItem",
"dynamodb:Query",
"dynamodb:UpdateItem"
],
"Resource": [
"arn:aws:dynamodb:us-east-1:XXX:table/UserData"
],
"Condition": {
"ForAllValues:StringEquals": {
"dynamodb:LeadingKeys": "${cognito-identity.amazonaws.com:sub}"
}
}
}






amazon-web-services aws-lambda amazon-dynamodb






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Nov 26 '18 at 12:09









HanchHanch

122




122













  • Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

    – K Mo
    Nov 28 '18 at 8:42











  • Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

    – Hanch
    Dec 11 '18 at 20:58



















  • Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

    – K Mo
    Nov 28 '18 at 8:42











  • Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

    – Hanch
    Dec 11 '18 at 20:58

















Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

– K Mo
Nov 28 '18 at 8:42





Your issue is around your use of "cognito-identity.amazonaws.com:sub". See stackoverflow.com/questions/42605419/…

– K Mo
Nov 28 '18 at 8:42













Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

– Hanch
Dec 11 '18 at 20:58





Well, I just found out that the ${cognito-identity.amazonaws.com:sub} doesn't really refer to the 'sub' field in the authetication token you get from cognito user pool, but rather to the IdentityId you get from the the identityPool for that user!!

– Hanch
Dec 11 '18 at 20:58












0






active

oldest

votes












Your Answer






StackExchange.ifUsing("editor", function () {
StackExchange.using("externalEditor", function () {
StackExchange.using("snippets", function () {
StackExchange.snippets.init();
});
});
}, "code-snippets");

StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "1"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53480829%2faws-lambda-to-use-caller-identity%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























0






active

oldest

votes








0






active

oldest

votes









active

oldest

votes






active

oldest

votes
















draft saved

draft discarded




















































Thanks for contributing an answer to Stack Overflow!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53480829%2faws-lambda-to-use-caller-identity%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

To store a contact into the json file from server.js file using a class in NodeJS

Redirect URL with Chrome Remote Debugging Android Devices

Dieringhausen