Auth0 with AWS Cognito OpenID Connect, how to skip re login

hey!

I’m using AWS Cognito as OIDC <> Auth0 as SAML-IDP (idp-initiated) <> SP.

I have a web-app which has login mechanism with AWS Cognito pool,

and I’m trying to redirect logged-in customers to third-party URL (which requires log-in as well, SAML).

I have setup Auth0 OpenID Connect (AWS Cognito - see image below), which seems to work well (users are synced from my user-pool with Auth0/User Management/Users).

When i’m redirecting my logged in users, I redirect them to Auth0 Identity Provider Login URL (i.e: dev-APP.us.auth0.com/samlp/SOME_APP?connection=AWSCognito)

the problem i’m facing is that for the first time - user is required to log-in again (to cognito) although he was already logged in (see image below).

I was trying to follow up the requests made after redirection to Auth0 Provider Login URL and it seems that /authorize URL on cognito is the issue (https://XXXXX.auth.us-east-1.amazoncognito.com/oauth2/authorize)

what am i’m missing here? is there any way to skip that step?
thanks!




tried to redirect directly to cognito hosted UI https://<yourDomainPrefix>.auth.<region>.amazoncognito.com/login?response_type=token&client_id=<yourClientId>&redirect_uri=<redirectUrl> and still requests a re-login

Hi @avivk

I am sorry about the late reply to your inquiry!

From what I understand, once the user is redirected to the 3rd party URL, you are looking to implement Seamless SSO between those apps. The issue appears to be that your 3rd party app is a separate application which does not check if the user is registered with Auth0 or with your application.

Please review this community post, our documentation relates to OIDC SSO or this article regarding the matter.

If you have any other questions or found a solution to the issue, feel free to leave a reply or post again on the community!

Kind Regards,
Nik

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.