Feature Request: Implicitly allow egress traffic to *.amazoncognito.com #236
Labels
enhancement
Roadmap: Awaiting Customer Feedback
We need to get more information in order understand how we will implement this feature.
If you want to see App Mesh implement this idea, please upvote with a 👍.
Tell us about your request
Today App Mesh allows endpoints within the mesh to communicate with all AWS services (
*.amazonaws.com
) without the customer needing to explicitly define them as backends. However, some AWS services have different domains, such as Amazon Cognito (*.amazoncognito.com
). It would be great to automatically allow egress traffic from endpoints within the mesh to Cognito.Which integration(s) is this request for?
All
Are you currently working around this issue?
It's possible to model Amazon Cognito as a Virtual Service and a Virtual Node where the Virtual Service name and Virtual Node DNS hostname is the same as the exact Cognito domain used. However, for this to work, the proxy will need to initiate TLS using a client policy, and the application will need to disable TLS for Cognito communication (see #162 for why this is the case).
The text was updated successfully, but these errors were encountered: