Build Cognito user pool configurations with MFA, password policies, and Lambda triggers.
Last verified: May 2026
Build Cognito user pool configs with auth flows, MFA, password policies, and Lambda triggers.
Required Fields
PoolNamePolicies.PasswordPolicy.MinimumLengthSchemaOutput will appear here...Amazon Cognito User Pools provide a fully managed identity provider for web and mobile applications, handling user sign-up, sign-in, MFA, and token management. Configuration involves dozens of interrelated settings — password policies, MFA options, attribute schemas, Lambda triggers for custom workflows, and app client settings with OAuth scopes. The Cognito User Pool Builder walks you through these options and generates the complete configuration JSON, reducing the risk of misconfigurations that can lock users out or weaken authentication security.
Your team is replacing a custom-built auth system with Cognito. The legacy DB has 50K users with bcrypt-hashed passwords. The builder generates a Cognito User Pool config + a User Migration Lambda trigger that validates old credentials against your legacy DB. Users sign in normally; the trigger transparently migrates them on first login. No mass password reset, no UX disruption. After 90 days, ~95% of active users have migrated; the remaining 5% are dormant accounts that get a forced reset email.
Always enable adaptive authentication for production Cognito user pools. It analyzes login patterns (device, location, attempt frequency) and steps up to MFA when risk is detected. Standard MFA (always-required) creates user friction; adaptive applies it only when needed — better UX with the same security.
TOTP is the right MFA default in 2026. SMS-based MFA is vulnerable to SIM swap attacks (used in the Twitter/Coinbase breaches). For B2B and security-sensitive apps, REQUIRE TOTP. SMS is acceptable for low-risk consumer apps but should be removed as soon as users adopt TOTP.
User Migration Lambda triggers are gold for migrating from legacy auth systems. Without them, you'd need to force every user to reset their password during migration. With them, users seamlessly transition on next login while you validate their old credentials behind the scenes — zero user-visible disruption.
The builder generates Cognito User Pool configurations across multiple sections: password policy (length, character requirements), MFA settings (TOTP, SMS, adaptive), schema (standard + custom attributes), Lambda triggers (pre-sign-up, custom messages, etc.), app client settings (OAuth flows, token validity, allowed scopes), and identity providers (social, SAML, OIDC federation). Output is generated as aws cognito-idp create-user-pool commands and Terraform aws_cognito_user_pool resources.
Was this tool helpful?
Disclaimer: This tool runs entirely in your browser. No data is sent to our servers. Always verify outputs before using them in production. AWS, Azure, and GCP are trademarks of their respective owners.