CognitoIdentityProvider / Client / associate_software_token
associate_software_token#
- CognitoIdentityProvider.Client.associate_software_token(**kwargs)#
Begins setup of time-based one-time password (TOTP) multi-factor authentication (MFA) for a user, with a unique private key that Amazon Cognito generates and returns in the API response. You can authorize an
AssociateSoftwareToken
request with either the user’s access token, or a session string from a challenge response that you received from Amazon Cognito.Note
Amazon Cognito disassociates an existing software token when you verify the new token in a VerifySoftwareToken API request. If you don’t verify the software token and your user pool doesn’t require MFA, the user can then authenticate with user name and password credentials alone. If your user pool requires TOTP MFA, Amazon Cognito generates an
MFA_SETUP
orSOFTWARE_TOKEN_SETUP
challenge each time your user signs in. Complete setup withAssociateSoftwareToken
andVerifySoftwareToken
.After you set up software token MFA for your user, Amazon Cognito generates a
SOFTWARE_TOKEN_MFA
challenge when they authenticate. Respond to this challenge with your user’s TOTP.Note
Amazon Cognito doesn’t evaluate Identity and Access Management (IAM) policies in requests for this API operation. For this operation, you can’t use IAM credentials to authorize requests, and you can’t grant IAM permissions in policies. For more information about authorization models in Amazon Cognito, see Using the Amazon Cognito user pools API and user pool endpoints.
Authorize this action with a signed-in user’s access token. It must include the scope
aws.cognito.signin.user.admin
.See also: AWS API Documentation
Request Syntax
response = client.associate_software_token( AccessToken='string', Session='string' )
- Parameters:
AccessToken (string) – A valid access token that Amazon Cognito issued to the user whose software token you want to generate. You can provide either an access token or a session ID in the request.
Session (string) – The session identifier that maintains the state of authentication requests and challenge responses. In
AssociateSoftwareToken
, this is the session ID from a successful sign-in. You can provide either an access token or a session ID in the request.
- Return type:
dict
- Returns:
Response Syntax
{ 'SecretCode': 'string', 'Session': 'string' }
Response Structure
(dict) –
SecretCode (string) –
A unique generated shared secret code that is used by the TOTP algorithm to generate a one-time code.
Session (string) –
The session identifier that maintains the state of authentication requests and challenge responses. This session ID is valid for the next request in this flow, VerifySoftwareToken.
Exceptions
CognitoIdentityProvider.Client.exceptions.ConcurrentModificationException
CognitoIdentityProvider.Client.exceptions.InvalidParameterException
CognitoIdentityProvider.Client.exceptions.NotAuthorizedException
CognitoIdentityProvider.Client.exceptions.ResourceNotFoundException
CognitoIdentityProvider.Client.exceptions.InternalErrorException
CognitoIdentityProvider.Client.exceptions.SoftwareTokenMFANotFoundException
CognitoIdentityProvider.Client.exceptions.ForbiddenException