You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Note:** Email-based MFA is currently not supported with `defineAuth`. We are working towards supporting this feature. For more information, visit the [feature request in GitHub](https://github.com/aws-amplify/amplify-backend/issues/2159).
64
69
65
-
To take advantage of this feature with an Amplify generated backend, the underlying CDK construct can be extended manually. See [overriding Cognito User Pool multi-factor authentication options](/[platform]/build-a-backend/auth/modify-resources-with-cdk/#override-cognito-userpool-multi-factor-authentication-options) for more information.
66
-
</Callout>
67
70
68
71
When MFA is `REQUIRED` with SMS in your backend auth resource, you will need to pass the phone number during sign-up API call. If you are using the `email` or `username` as the primary sign-in mechanism, you will need to pass the `phone_number` attribute as a user attribute.
69
72
@@ -856,12 +859,36 @@ If a user loses access to their TOTP device, they will need to contact an admini
856
859
In a scenario where MFA is marked as "Required" in the Cognito User Pool and another MFA method is not set up, the administrator would need to first initiate an [`AdminUpdateUserAttributes`](https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_AdminUpdateUserAttributes.html) call and update the user's phone number attribute. Once this is complete, the administrator can continue changing the MFA preference to SMS as suggested above.
857
860
858
861
## Multi-factor authentication with EMAIL
859
-
<InlineFilterfilters={["react"]}>
860
-
<Calloutinfo>
861
-
**Note:** Email-based MFA is currently not supported in the [Authenticator component](https://ui.docs.amplify.aws/react/connected-components/authenticator). We are working towards supporting this feature. For more information, visit the [feature request in GitHub](https://github.com/aws-amplify/amplify-ui/issues/5983).
862
+
To enable email MFA, set `email: true` in your multifactor configuration and configure an email sender.
862
863
864
+
<Calloutwarning>
865
+
To permit users to sign in with email MFA, your user pool must have the following configuration options:
866
+
867
+
- You have the Plus or Essentials feature plan in your user pool.
868
+
- Your user pool sends email messages with your own Amazon SES resources.
869
+
870
+
For more details, see [Amazon Cognito email MFA configuration](https://docs.aws.amazon.com/cognito/latest/developerguide/user-pool-settings-mfa-sms-email-message.html).
// Important! The logic to resolve this value cannot determine whether email mfa is enabled when overriding the resource.
84
-
// Be sure to pick a recovery option appropriate for your application.
85
-
accountRecovery: "EMAIL_AND_PHONE_WITHOUT_MFA",
86
-
senders: {
87
-
email: {
88
-
fromEmail: "registrations@example.com",
89
-
},
90
-
},
91
-
})
92
-
```
93
-
94
-
Next, extend the underlying CDK construct by activating [Amazon Cognito's Advanced Security Features (ASF)](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pool-settings-advanced-security.html) and add `EMAIL_OTP` to the enabled MFA options.
###Override Cognito UserPool to enable passwordless sign-in methods
66
+
## Override Cognito UserPool to enable passwordless sign-in methods
123
67
124
68
You can modify the underlying Cognito user pool resource to enable sign in with passwordless methods. [Learn more about passwordless sign-in methods](/[platform]/build-a-backend/auth/concepts/passwordless/).
Copy file name to clipboardExpand all lines: src/pages/[platform]/deploy-and-host/sandbox-environments/seed/index.mdx
-7Lines changed: 0 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -305,13 +305,6 @@ npx ampx sandbox seed
305
305
```
306
306
307
307
SMS MFA follows the same pattern as Email MFA, using command line prompts for verification. Just replace `mfaPreference: "EMAIL"` with `mfaPreference: "SMS"` in your configuration. The command line experience will be identical, prompting for the SMS code instead of the email code.
308
-
309
-
<Calloutinfo>
310
-
**Note:** Email-based MFA is currently not supported with `defineAuth`. We are working towards supporting this feature. For more information, visit the [feature request in GitHub](https://github.com/aws-amplify/amplify-backend/issues/2159).
311
-
312
-
To take advantage of this feature with an Amplify generated backend, the underlying CDK construct can be extended manually. See [overriding Cognito User Pool multi-factor authentication options](/[platform]/build-a-backend/auth/modify-resources-with-cdk/#override-cognito-userpool-multi-factor-authentication-options) for more information.
313
-
</Callout>
314
-
315
308
### Data
316
309
317
310
For example, if you like to seed your Data API, lets start by creating a GraphQL API with a `Todo` model with authorization mode set to `userPool`:
0 commit comments