-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Enhancement]: aws_cognito_user_pool.password_policy.Allow_reuse_of_previous_passwords #39016
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
I want to second this issue, with a slight addendum: resource "aws_cognito_user_pool" "this" {
password_policy {
minimum_length = "10"
require_lowercase = "true"
require_numbers = "true"
require_symbols = "true"
require_uppercase = "true"
temporary_password_validity_days = "10"
password_history_size = 2 /* Instead of aforementioned Allow_reuse_of_previous_passwords */
}
} At the moment this can be achieved by using exec local and manually invoking the the aws cli |
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
This functionality has been released in v5.65.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Request for Allow_reuse_of_previous_passwords to be added to the password_policy in aws_cognito_user_pool resource.
This is a new feature released in Cognito and would make sense to enhance the password_policy as thats where it sits within the UI experience, however there is a requirement for the advanced security to be active.
Affected Resource(s) and/or Data Source(s)
aws_cognito_user_pool
Potential Terraform Configuration
References
No response
Would you like to implement a fix?
No
The text was updated successfully, but these errors were encountered: