Authentic
AuthenticContact
  • Authentic 101
    • About Authentic
    • Company Background
    • Customer Reviews
    • How Authentic Works
      • Captive Insurance
      • Business Owner's Policy
      • Coverage Options
      • Our Partner Appetite
        • Exclusions
        • Endorsements
  • Embedding Insurance
    • Integration Overview
    • Add Insurance to Your Platform
      • Embed our widget
        • Accessing Event Data through Webhooks
      • Different endpoints & functionality within our widget
        • Instant Estimate (/estimate)
        • Welcome Page (/welcome)
        • Direct to Lead Form (/apply)
        • Policy Hub (/policy)
    • Data Share
      • Data Sharing via Widget
      • Data Sharing via URL
      • Commonly Prefilled Questions
      • SMB Class Codes
      • Data Capture (Easy Webhook Set Up)
      • Sample Webhook Events
    • Authentic User Verification Offering(s)
    • Custom Insurance Domain
    • Tracking Marketing (UTM Params)
  • Go To Market
    • Go To Market for SaaS Partners
      • Create Access Points
      • Buying Triggers
      • Prequote Marketing Emails
        • Authentic-Led Prequote Campaigns
        • Tenant-Led Prequote Campaigns
        • URL Prefill Instructions
    • Brand Assets + Marketing Templates
    • Generating Estimate Links
  • More Reading
    • Learn More about Authentic!
    • Why Authentic?
  • Support
    • FAQs
Powered by GitBook
On this page
Export as PDF
  1. Embedding Insurance

Authentic User Verification Offering(s)

Configuring Identity Providers and Custom Mappings in Amazon Cognito User Pools

PreviousSample Webhook EventsNextCustom Insurance Domain

Last updated 5 months ago

Verification Offerings

  • Option 1: Set up a SAML provider in Cognito User Pool

    • [Set up Auth0 as a SAML identity provider with an Amazon Cognito user pool | AWS re:Post]()

    • [Troubleshoot invalid SAML response errors in Amazon Cognito | AWS re:Post]() - Add the SAML metadata XML as an IDP in Cognito

    • Enable the new idP for each client

    • For XML attribute mapping, the attribute needs to be mapped to the fully qualified URL in the XML metadata document for the attribute you want

    • In order to use alarm.com's JWT as the authentication mechanism to their API, we will need them to pass the JWT token as a mapping in their XML metadata

  • Option 2: Set up an OIDC provider in Cognito User Pool - [Set up Auth0 as an OIDC provider for Amazon Cognito | AWS re:Post]() -

  • Option 3: Get custom identity mappings by providing JWT to idpool

https://repost.aws/knowledge-center/auth0-saml-cognito-user-pool
https://repost.aws/knowledge-center/cognito-invalid-saml-response-errors
https://repost.aws/knowledge-center/auth0-oidc-cognito