- Newest
- Most votes
- Most comments
Hello.
Just to be sure, use the AWS CLI command below to check "SchemaAttributes" and make sure it matches the contents of the CloudFormation template.
https://awscli.amazonaws.com/v2/documentation/api/latest/reference/cognito-idp/describe-user-pool.html
aws cognito-idp describe-user-pool --user-pool-id us-west-2_aaaaaaaaa
AWS CLI can be executed from CloudShell.
https://docs.aws.amazon.com/cloudshell/latest/userguide/welcome.html
Also, try deploying only the Cognito user pool using CloudFormation in a different AWS account, etc., and check whether the settings are the same as the existing user pool.
If all of these match, it may be an issue on AWS side, so I recommend that you open a case with AWS Support under "Account and billing".
Inquiries under "Account and billing" can be made free of charge.
https://docs.aws.amazon.com/awssupport/latest/user/case-management.html
Relevant content
- asked 5 years ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated a year ago
- AWS OFFICIALUpdated 3 months ago
- AWS OFFICIALUpdated a year ago
Thanks for the suggestion. I actually triedgetting the attributes via
describe-user-pool
already and they are the same, plus it lists all the default attributes, even ones that are not enabled in the pool. I noticed this strange behaviour so deployed a new user pool with onlyemail
as a default attribute, and no custom attributes, and it still lists everything. I think I will follow your advice and just file a support request via accounts and billing. Thanks