Database Reference
In-Depth Information
Architecture
As we do in any software development life cycle, let's try to build the architecture diagram
as follows for better understanding:
The previous diagram shows how we can connect different AWS and non-AWS compon-
ents together. We will also use AWS Secure Token Service ( STS ), which we have seen in
Chapter 5 , Advanced Topics , in order to authenticate the users.
The flow for this application would be as follows:
1. A user logs in to the application using their Facebook, Google, or Amazon creden-
tials.
2. AWS sends this request to identity providers for verification; in return, it will get
the identity token. Using this token, the client sends this request to STS to get tem-
porary credentials.
Search WWH ::




Custom Search