- Más nuevo
- Más votos
- Más comentarios
Hello,
Cognito User Pool API uses characters that are typically html-escaped in the temporary passwords creates such as '>' and '&' . Accordingly, when Cognito User Pool sends these temporary passwords over email in invitation emails, it does a html-escape of the temporary password string, If the temporary password contain > or & , they will be replaced by 'gt' and 'amp'. I would like to inform you that the internal team is already aware of this issue and is currently working on this on priority. Thank you for providing your valuable feedback on the service.
Currently, not only the temporary password specified by the customer but also the temporary password automatically generated by Cognito may contain characters escaped by HTML. Therefore, we apologize for any inconvenience this may cause, and we would appreciate it if you could add a process to unescape/decode the HTML of the temporary password in the custom email sender's Lambda trigger.
Wish you an Awesome day ahead and stay safe !
Thank you
Contenido relevante
- preguntada hace 21 días
- preguntada hace 10 días
- preguntada hace un mes
- Como solucionar el error: Supplied Policy document is breaching Cloudwatch Logs policy length limit.Respuesta aceptadapreguntada hace 7 días
- OFICIAL DE AWSActualizada hace 2 años
- OFICIAL DE AWSActualizada hace un año
- OFICIAL DE AWSActualizada hace 9 meses
- OFICIAL DE AWSActualizada hace 7 meses