• TechOps Examples
  • Posts
  • Designing an AWS Serverless Architecture for SaaS User Authentication

Designing an AWS Serverless Architecture for SaaS User Authentication

TechOps Examples

Hey β€” It's Govardhana MK πŸ‘‹

Along with a use case deep dive, we identify the remote job opportunities, top news, tools, and articles in the TechOps industry.

πŸ‘‹ Before we begin... a big thank you to today's sponsor CAUSELY

[Free Service Reliability Assessment] Is Your Kubernetes Environment Truly Reliable?

Uncover hidden failure points in your critical services with Causely’s FREE Service Reliability Assessment. Diagnose, remediate, and prevent application degradation in complex cloud-native environments.

What You'll Get:

  • Service Dependency View: Visualize your key service topology and cause-and-effect relationships.

  • Reliability Assessment: Evaluate your environment's resilience to application updates and changes.

  • Recommendations Report: Get actionable insights to prevent SLO violations, from quick wins to strategic improvements.

IN TODAY'S EDITION

🧠 Use Case
  • Designing an AWS Serverless Architecture for SaaS User Authentication

πŸš€ Top News

πŸ‘€ Remote Jobs

πŸ“šοΈ Resources

πŸ“’ Reddit Threads

πŸ› οΈ TOOL OF THE DAY

kluctl - A unified command-line interface to manage large Kubernetes deployments, integrating tools like Kustomize and Helm.

Centered around "targets," Kluctl facilitates deploying, diffing, and pruning across clusters or environments and provides a Web UI for visualization and control.

🧠 USE CASE

Designing an AWS Serverless Architecture for SaaS User Authentication

Building authentication for a SaaS app means handling sign ups, verifying users, managing permissions, and connecting with marketing tools (all while keeping it scalable, secure, and cost effective).

A serverless approach using AWS services like Cognito, Lambda, DynamoDB, and SES provides an event driven, fully managed authentication flow.

Let's break it down.

Download a high resolution copy of this diagram here for future reference.

Services in Designing the Architecture

  • Amazon Cognito β†’ User authentication and identity management.

  • AWS Lambda β†’ Serverless functions to handle business logic.

  • Amazon DynamoDB β†’ Stores user permissions and associated domains.

  • Amazon SES β†’ Sends transactional emails for account notifications.

  • Third party marketing tools β†’ Mailchimp, HubSpot, Beehiiv, ConvertKit etc.,

ABC’s of Authentication Flow and Logic

A. User Sign Up & Confirmation Process

Step 1: User Registration (AWS Cognito)

  • A user signs up via Cognito User Pool, providing email, password, and any required attributes (e.g., name, company, etc.).

  • Cognito sends a confirmation email (default) or an SMS OTP for account verification.

  • Upon successful verification, Cognito triggers the Post Confirmation Lambda (confirmUser).

Step 2: Post Confirmation Trigger – Processing New Users

Once Cognito confirms the user, AWS invokes the Post Confirmation Lambda (confirmUser), which:

  • Writes user details to DynamoDB (Permissions Table).

  • Associates the user with domains (if applicable).

  • Sends a transactional email via SES, welcoming the user.

  • Syncs the user email to marketing platforms (Mailchimp, HubSpot, etc.), if the user opted in.

B. User Login & Token Generation Process

Step 1: User Logs In

  • The user logs in with their Cognito credentials.

  • Cognito verifies the password, generates a JWT token, and triggers the Pre Token Generation Lambda (generateToken).

Step 2: Pre Token Generation Trigger – Injecting Custom Claims

The generateToken Lambda is responsible for enhancing the JWT token with additional information:

  • Fetches user role & permissions from DynamoDB (Permissions Table).

  • Reads associated domains from DynamoDB (Domains Table).

  • Modifies the JWT token, adding:

    • Custom Claims (role, permissions, domains).

    • This allows applications to make authorization decisions without extra API calls.

Why is this necessary?

Instead of querying DynamoDB on every API request, the token already contains what the app needs, thus improving performance.

C. Handling Authenticated API Requests

Once logged in:

  • The user includes the JWT token in requests to protected APIs.

  • The backend validates the token against Cognito.

  • APIs check custom claims (permissions, roles, domains) embedded in the token to enforce access control.

Architecture decisions are subjective. What works for one team might not work for another. Think it through before committing to any design (including mine here).

I run a DevOps and Cloud consulting agency and have helped 17+ businesses, including Stanford, Hearst Corporation, CloudTruth, and more.

When your business needs my services, book a free 1:1 business consultation.

You may even like:

Looking to promote your company, product, service, or event to 40,000+ Cloud Native Professionals? Let's work together.