Need advice about which tool to choose?Ask the StackShare community!
Amazon Cognito vs AWS IAM: What are the differences?
Developers describe Amazon Cognito as "Securely manage and synchronize app data for your users across their mobile devices". You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline. On the other hand, AWS IAM is detailed as "Securely control access to AWS services and resources for your users". AWS Identity and Access Management.
Amazon Cognito and AWS IAM are primarily classified as "User Management and Authentication" and "Cloud Access Management" tools respectively.
Some of the features offered by Amazon Cognito are:
- Manage Unique Identities
- Work Offline
- Store and Sync across Devices
On the other hand, AWS IAM provides the following key features:
- Manage IAM users and their access - You can create users in IAM, assign them individual security credentials (i.e., access keys, passwords, and Multi-Factor Authentication devices) or request temporary security credentials to provide users access to AWS services and resources.
- Manage IAM roles and their permissions - You can create roles in IAM, and manage permissions to control which operations can be performed by the entity, or AWS service, that assumes the role. You can also define which entity is allowed to assume the role.
- Manage federated users and their permissions - You can enable identity federation to allow existing identities (e.g. users) from your corporate directory or from a 3rd party such as Login with Amazon, Facebook, and Google to access the AWS Management Console, to call AWS APIs, and to access resources, without the need to create an IAM user for each identity.
"Backed by Amazon" is the top reason why over 11 developers like Amazon Cognito, while over 21 developers mention "Centralized powerful permissions based access" as the leading cause for choosing AWS IAM.
According to the StackShare community, AWS IAM has a broader approval, being mentioned in 133 company stacks & 50 developers stacks; compared to Amazon Cognito, which is listed in 41 company stacks and 13 developer stacks.
I started our team on Amazon Cognito because I was a Solutions Architect at AWS and found it really easy to follow the tutorials and get a basic app up and running with it.
When our team started working with it, they very quickly became frustrated because of the poor documentation. After 4 days of trying to get all the basic passwordless auth working, our lead engineer made the decision to abandon it and try Auth0... and managed to get everything implemented in 4 hours.
The consensus was that Cognito just isn't mature enough or well-documented, and that the implementation does not cater for real world use cases the way that it should. I believe Amplify has made some of this simpler, but I would still recommend Auth0 as it's been bulletproof for us, and is a sensible price.
Pros of Amazon Cognito
- Backed by Amazon14
- Manage Unique Identities7
- Work Offline4
- MFA3
- Store and Sync2
- Free for first 50000 users1
- It works1
- Integrate with Google, Amazon, Twitter, Facebook, SAML1
- SDKs and code samples1
Pros of AWS IAM
- Centralized powerful permissions based access23
- Straightforward SSO integration3
Sign up to add or upvote prosMake informed product decisions
Cons of Amazon Cognito
- Massive Pain to get working4
- Documentation often out of date3
- Login-UI sparsely customizable (e.g. no translation)2
- Docs are vast but mostly useless1
- MFA: there is no "forget device" function1
- Difficult to customize (basic-pack is more than humble)1
- Lacks many basic features1
- There is no "Logout" method in the API1
- Different Language SDKs not compatible1
- No recovery codes for MFA1
- Hard to find expiration times for tokens/codes1
- Only paid support1
Cons of AWS IAM
- Cloud auth limited to resources, no apps or services1
- No equivalent for on-premise networks, must adapt to AD1