Choose Manage Identity Pools, and then choose Create new identity pool.Ĩ. For more information, see Creating a new group in the AWS Management Console.Ħ. Choose the Groups tab, and then choose Create group. Then, select the Mark email as verified check box.ĥ. Choose Create user, and then complete the fields. In the Amazon Cognito console navigation pane, choose Users and groups.Ĥ. Resolution Create an Amazon Cognito user pool and identity poolģ. (Optional) If fine-grained access control (FGAC) is turned on, add an Amazon Cognito authenticated role. For more information, see How can I access OpenSearch Dashboards from outside of a VPC using Amazon Cognito authentication?ĥ. Note: You can also use an NGINX proxy or Client VPN to access Dashboards from outside of a VPC with Amazon Cognito authentication. Create an SSH tunnel from your local machine to the EC2 instance. Use a browser add-on such as FoxyProxy to configure a SOCKS proxy.Ĥ. This subnet must be in the same VPC as your OpenSearch Service domain.ģ. Create an Amazon Elastic Compute Cloud (Amazon EC2) instance in a public subnet. Create an Amazon Cognito user pool and identity pool.Ģ. Important: Be sure that accessing OpenSearch Dashboards from outside the VPC is compliant with your organization's security requirements.Īccess Dashboards from outside the VPC using an SSH tunnel:ġ. You can also access OpenSearch Dashboards from outside the VPC using an SSH tunnel. You access an Amazon OpenSearch Service domain from another VPC by setting up an OpenSearch Service-managed VPC endpoint (powered by AWS PrivateLink). By default, Amazon Cognito restricts OpenSearch Dashboards access to AWS Identity and Access Management (IAM) users in the VPC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |