From a313a862722f7e67d2449c607a5796002d5bcb49 Mon Sep 17 00:00:00 2001 From: ykethan Date: Wed, 22 Jan 2025 16:23:31 -0500 Subject: [PATCH 1/2] update example with supported scope and adds link --- .../auth/concepts/external-identity-providers/index.mdx | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx b/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx index 4dcd1a58e68..5c6a63f0113 100644 --- a/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx +++ b/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx @@ -216,6 +216,8 @@ You need to now inform your external provider of the newly configured authentica +- [Learn more about using social identity providers with user pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-social-idp.html) + ### Customizing scopes for retrieving user data from external providers You can determine the pieces of data you want to retrieve from each external provider when setting them up in the `amplify/auth/resource.ts` file using `scopes`. @@ -230,7 +232,7 @@ export const auth = defineAuth({ clientId: secret('LOGINWITHAMAZON_CLIENT_ID'), clientSecret: secret('LOGINWITHAMAZON_CLIENT_SECRET'), // highlight-next-line - scopes: ['email'] + scopes: ['profile'] }, callbackUrls: [ 'http://localhost:3000/profile', From ddcc9c769eb529da954885f2336cae3679221448 Mon Sep 17 00:00:00 2001 From: ykethan Date: Wed, 22 Jan 2025 17:59:19 -0500 Subject: [PATCH 2/2] rm bullet point --- .../auth/concepts/external-identity-providers/index.mdx | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx b/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx index 5c6a63f0113..47485bebe50 100644 --- a/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx +++ b/src/pages/[platform]/build-a-backend/auth/concepts/external-identity-providers/index.mdx @@ -216,7 +216,7 @@ You need to now inform your external provider of the newly configured authentica -- [Learn more about using social identity providers with user pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-social-idp.html) +Learn more about using social identity providers with user pool](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-social-idp.html) ### Customizing scopes for retrieving user data from external providers @@ -279,7 +279,7 @@ export const auth = defineAuth({ }); ``` -- [Learn more about configuring the React Authenticator component for external providers](https://ui.docs.amplify.aws/react/connected-components/authenticator/configuration#external-providers) +[Learn more about configuring the React Authenticator component for external providers](https://ui.docs.amplify.aws/react/connected-components/authenticator/configuration#external-providers) ## Configure OIDC provider