sourceUser
An external IdP account for a user who doesn't exist yet in the user pool. This user must be a federated user (for example, a SAML or Facebook user), not another native user.
If the SourceUser
is using a federated social IdP, such as Facebook, Google, or Login with Amazon, you must set the ProviderAttributeName
to Cognito_Subject
. For social IdPs, the ProviderName
will be Facebook
, Google
, or LoginWithAmazon
, and Amazon Cognito will automatically parse the Facebook, Google, and Login with Amazon tokens for id
, sub
, and user_id
, respectively. The ProviderAttributeValue
for the user must be the same value as the id
, sub
, or user_id
value found in the social IdP token.
For OIDC, the ProviderAttributeName
can be any mapped value from a claim in the ID token, or that your app retrieves from the userInfo
endpoint. For SAML, the ProviderAttributeName
can be any mapped value from a claim in the SAML assertion.
The following additional considerations apply to SourceUser
for OIDC and SAML providers.
You must map the claim to a user pool attribute in your IdP configuration, and set the user pool attribute name as the value of
ProviderAttributeName
in yourAdminLinkProviderForUser
request. For example,email
.When you set
ProviderAttributeName
toCognito_Subject
, Amazon Cognito will automatically parse the default unique identifier found in the subject from the IdP token.