A sample serverless authentication service using AWS Lambda and DynamoDB, designed for cost-efficient and scalable user management.
LambdAuth is a sample authentication service built with a serverless architecture on AWS. It provides core user management functions—such as registration, login, and password reset—using AWS Lambda for execution and DynamoDB for storage. It solves the need for a scalable, cost-efficient authentication backend that integrates seamlessly with Amazon Cognito for identity federation.
Developers and architects exploring serverless authentication patterns on AWS, or those needing a reference implementation for integrating custom auth with Amazon Cognito.
It offers a fully functional, security-focused example that is easy to deploy and modify, demonstrating best practices for serverless auth without the complexity of building from scratch.
A sample authentication service implemented with a server-less architecture, using AWS Lambda to host and execute the code and Amazon DynamoDB as persistent storage. This provides a cost-efficient solution that is scalable and highly available and can be used with Amazon Cognito for Developer Authenticated Identities.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Built entirely on AWS Lambda and DynamoDB, it offers automatic scaling and eliminates server management, making it cost-efficient for variable workloads as described in the serverless foundation.
Seamlessly integrates with Amazon Cognito for developer-authenticated identities, enabling easy identity federation and role assumption, as highlighted in the authentication flows.
Implements salted HMAC-SHA1 hashing for passwords and includes email verification via Amazon SES, adhering to basic security best practices outlined in the README.
Provides Bash scripts like init.sh and deploy.sh to automate AWS resource creation and updates, simplifying initial deployment and configuration as per the installation guide.
Uses HMAC-SHA1 for password storage, which is considered weak compared to modern algorithms like bcrypt, posing a security risk for current applications.
Explicitly labeled as a sample and not production-ready, with the author recommending Amazon Cognito User Pools instead, limiting its reliability for real-world use.
Heavily dependent on AWS services like Lambda, DynamoDB, and Cognito, making it unsuitable for multi-cloud or non-AWS environments without significant rewrites.
Requires manual setup of AWS CLI, jq tool, and detailed config.json editing, which can be error-prone and challenging for those unfamiliar with AWS ecosystems.