LIVEAI Bootcamps · May 2026 · 🇫🇷 CET
Resources · Integrations · n8n FREE · 2026Logo d'AWS Cognito avec le texte stylisé et des formes abstraites.

AWS COGNITO n8n INTEGRATION: AUTOMATE AWS COGNITO WITH N8N

AWS COGNITO N8N INTEGRATION: AUTOMATE AWS COGNITO WITH N8N

Need help

Need help automating Aws Cognito with n8n?

Our team will get back to you in minutes.

Reply within 1 business hour
Why automate

Why automate Aws Cognito with n8n?

The AWS Cognito n8n integration gives you access to 13 actions spanning user management, group operations, and user pool administration. This means you can build complete identity management workflows without writing a single line of code—from creating users and managing their attributes to organizing them into groups and retrieving pool configurations.

Significant time savings are the most immediate benefit. Instead of manually navigating the AWS Console to add users or update attributes one by one, you can process hundreds of user operations in seconds. Set up smart rules that automatically create Cognito users when leads convert in your CRM like HubSpot, or sync user attributes whenever profile data changes in your application database. Improved responsiveness follows naturally—when a new customer signs up, they can be instantly provisioned with the right group memberships and attributes, no human intervention required.

Zero oversight becomes reality when you connect AWS Cognito to n8n automation workflows. Your workflows run 24/7, ensuring every user creation, update, or group assignment happens exactly when it should. And with n8n's seamless integration ecosystem, you can connect AWS Cognito to hundreds of other applications—from Slack notifications when new users are created, to spreadsheet logging of all user operations, to webhook triggers from your custom applications.

Credentials

How to connect Aws Cognito to n8n?

  1. !
    1 step

    How to connect Aws Cognito to n8n?

    1. 01

      Add the node

      The AWS Cognito n8n integration uses AWS IAM credentials for authentication, giving you secure, role-based access to your Cognito resources.Basic configuration:Create an IAM User: In your AWS Console, navigate to IAM and create a new user with programmatic access. Attach a policy that grants the necessary Cognito permissions (AmazonCognitoPowerUser or a custom policy).Generate Access Keys: Once your IAM user is created, generate an Access Key ID and Secret Access Key. Store these securely—you'll need them in n8n.Add Credentials in n8n: In n8n, go to Credentials → Add Credential → AWS. Enter your Access Key ID, Secret Access Key, and select your AWS region.Test the Connection: Add an AWS Cognito node to a workflow, select your credentials, and run a simple "Get Many Users" operation to verify everything works.Configure User Pool Access: Ensure your IAM user has access to the specific User Pools you want to manage in your workflows.

    Aws Cognito credentials
    TIP
    💡 TIP: Create a dedicated IAM user specifically for n8n rather than using your root account credentials. This follows AWS security best practices and lets you revoke access instantly if needed without affecting other services.
Need help

Need help automating Aws Cognito with n8n?

Our team will get back to you in minutes.

Reply within 1 business hour
Actions

Aws Cognito actions available in n8n

  1. 01
    Action 01

    Get many users

    The "Get many users" action is your go-to for retrieving user lists from any Cognito user pool. Whether you need to export all users for analysis, sync them to another system like Google Sheets, or simply audit who has access to your application, this action handles it efficiently.

    Key parameters:

    • Credential to connect with: Select your configured AWS IAM account from the dropdown. This is required for authentication.
    • User Pool: Choose your target user pool by ID. This is required—you must specify which pool to query.
    • Return All: Toggle this on to retrieve every user in the pool, or leave it off to use pagination. Optional but useful for large pools.
    • Limit: When Return All is off, this numeric field (default: 50) controls how many users to fetch per request. Optional.
    • Simplify: Enable this toggle to receive cleaner, more streamlined user data—stripping out metadata you don't need. Optional.
    • Filters: Add specific filter conditions to narrow results. Filter by email, status, or custom attributes. Optional but powerful for targeted queries.

    Common use cases: Export all users to a Google Sheet for stakeholder review. Sync active users to your email marketing platform nightly. Identify users matching specific attribute patterns for targeted communications.

    Get many users
  2. 02
    Action 02

    Update user

    The "Update user" action lets you modify any attribute on an existing Cognito user. This is essential for keeping user profiles synchronized with your business systems and updating metadata as users progress through your application.

    Key parameters:

    • Credential to connect with: Your AWS IAM account selection. Required.
    • User Pool: Select the user pool by ID containing the user you want to update. Required.
    • User: Specify the target user by their ID. Required.
    • User Attributes: Click "Add Attribute" to specify which attributes to update. You can modify standard attributes (email, phone_number, name) or custom attributes defined in your pool.

    Common use cases: Update user phone numbers when changed in your CRM like Salesforce. Add custom attributes like subscription_tier or last_login_date. Sync user metadata from external systems automatically.

    Update user
  3. 03
    Action 03

    Get user pool

    The "Get user pool" action retrieves configuration details about a specific Cognito user pool. This is invaluable for auditing, documentation, and building dynamic workflows that adapt based on pool settings.

    Key parameters:

    • Credential to connect with: Your AWS IAM credentials. Required.
    • User Pool: Select the pool by ID to retrieve its configuration. Required.
    • Simplify: Toggle on to receive a cleaner response format. Optional.

    Common use cases: Document your user pool configurations automatically. Verify pool settings before performing bulk operations. Build conditional workflows that check pool policies before user creation.

    Get user pool
  4. 04
    Action 04

    Remove user from group

    The "Remove user from group" action handles group membership revocation cleanly. Use it when users downgrade subscriptions, leave teams, or need access revoked for any reason.

    Key parameters:

    • Credential to connect with: AWS IAM account for authentication. Required.
    • User Pool: The pool containing both the user and group. Select by ID. Required.
    • User: Specify which user to remove by their ID. Required.
    • Group: The group name from which the user will be removed. Required.

    Common use cases: Automatically remove users from premium groups when subscriptions expire. Revoke team access when employees are marked inactive in HR systems. Clean up group memberships during user offboarding workflows.

    Remove user from group
  5. 05
    Action 05

    Add user to group

    The "Add user to group" action assigns users to Cognito groups, enabling role-based access control through your automation workflows. This is fundamental for permission management at scale.

    Key parameters:

    • Credential to connect with: Your AWS IAM credentials. Required.
    • User Pool: Select the user pool by ID. Required.
    • User: Specify the user by ID to add to the group. Required.
    • Group: The target group name or ID where the user will be added. Required.

    Common use cases: Add users to "premium" group when they complete payment. Assign new employees to department-specific groups based on HR data from Monday.com. Grant beta access by adding users to a "beta-testers" group automatically.

    Add user to group
  6. 06
    Action 06

    Create user

    The "Create user" action provisions new users directly in your Cognito user pool. This is essential for automated onboarding flows, admin-created accounts, and migration scenarios.

    Key parameters:

    • Credential to connect with: AWS IAM account selection. Required.
    • User Pool: Target pool where the user will be created. Select by ID. Required.
    • User Name: The username for the new user. This text field is required and must be unique within the pool.
    • Additional attributes: Configure email, phone number, and custom attributes as needed during creation.

    Common use cases: Create Cognito users when leads convert in Attio. Provision accounts automatically when employees are added to your HR system. Migrate users from legacy systems with preserved usernames.

    Create user
  7. 07
    Action 07

    Get user

    The "Get user" action retrieves complete details about a single user, including all standard and custom attributes. Use it to verify user status, fetch profile data, or check group memberships.

    Key parameters:

    • Credential to connect with: AWS IAM credentials. Required.
    • User Pool: The pool containing the target user. Select by ID. Required.
    • User: The specific user ID to retrieve. Required.
    • Simplify: Toggle to receive cleaner, more focused response data. Optional.

    Common use cases: Fetch user details before processing an order to verify eligibility. Check user status in conditional workflow branches. Retrieve custom attributes for personalization logic.

    Get user
  8. 08
    Action 08

    Delete user

    The "Delete user" action permanently removes a user from your Cognito user pool. Use with appropriate caution—this is irreversible and typically reserved for GDPR requests, account cleanup, or offboarding workflows.

    Key parameters:

    • Credential to connect with: AWS IAM account. Required.
    • User Pool: The pool containing the user to delete. Required.
    • User: The user ID to permanently remove. Required.

    Common use cases: Process GDPR deletion requests automatically. Remove test accounts after staging environment cleanup. Complete user offboarding by removing Cognito access.

    Delete user
  9. 09
    Action 09

    Get group

    The "Get group" action retrieves information about a specific group within your user pool, optionally including the list of users who belong to it.

    Key parameters:

    • Credential to connect with: AWS IAM credentials. Required.
    • User Pool: Select by ID. Required.
    • Group: Specify the group by name. Required.
    • Include Users: Toggle on to retrieve the list of users belonging to this group. Optional but useful for membership audits.

    Common use cases: Audit who has admin access by fetching the admin group. Verify group exists before adding users to it. Generate group membership reports for compliance.

    Get group
  10. 10
    Action 10

    Get many groups

    The "Get many groups" action retrieves multiple groups from a user pool at once, perfect for auditing, documentation, and building dynamic group selection interfaces.

    Key parameters:

    • Credential to connect with: AWS IAM account. Required.
    • User Pool: Select by ID. Required.
    • Return All: Toggle on to retrieve all groups, or use Limit for pagination. Optional.
    • Limit: Maximum groups to return per request (default: 50). Optional.
    • Include Users: Toggle to include user lists for each group. Optional.

    Common use cases: Export all groups and their memberships for security audits. Build dynamic dropdown menus populated with available groups. Document group structure across multiple user pools.

    Get many groups
  11. 11
    Action 11

    Delete group

    The "Delete group" action removes a group from your user pool. Users in the group aren't deleted—they simply lose membership in that group.

    Key parameters:

    • Credential to connect with: AWS IAM credentials. Required.
    • User Pool: The pool containing the group. Required.
    • Group: The group name to delete. Required.

    Common use cases: Clean up deprecated access tiers after migration. Remove temporary project groups after completion. Automate group lifecycle management.

    Delete group
  12. 12
    Action 12

    Create group

    The "Create group" action provisions new groups in your user pool, establishing the containers for role-based access control.

    Key parameters:

    • Credential to connect with: AWS IAM account. Required.
    • User Pool: Target pool for the new group. Required.
    • Group Name: The name for your new group (e.g., "premium-users", "beta-testers"). Required.
    • Additional Fields: Optional properties like description or precedence can be added here.

    Common use cases: Create subscription tier groups when new pricing plans launch. Provision project-specific groups dynamically. Set up department groups when organizational structure changes.

    Create group
  13. 13
    Action 13

    Update group

    The "Update group" action modifies existing group properties, such as description or IAM role association.

    Key parameters:

    • Credential to connect with: AWS IAM credentials. Required.
    • User Pool: Select by ID. Required.
    • Group: Specify the group by name or ID. Required.
    • Additional Fields: Add key-value pairs for properties you want to update. Optional.

    Common use cases: Update group descriptions for documentation purposes. Modify IAM role associations when access requirements change. Batch update group metadata across multiple pools.

    Update group
You've seen the integration

Build your first workflow with our team

Drop your email and we'll send you the catalog of automations you can ship today.

  • Free n8n & Make scenarios to import
  • Step-by-step setup docs
  • Live cohort + community support

Frequently asked questions

  • Is the AWS Cognito n8n integration free to use?
    The n8n integration itself is free—n8n is open-source and you can self-host it at no cost, or use n8n Cloud with various pricing tiers. However, AWS Cognito has its own pricing based on monthly active users (MAUs). The first 50,000 MAUs are included in the AWS free tier, making it cost-effective for small to medium applications. When building your n8n workflows, the API calls to Cognito don't incur additional charges beyond standard AWS API request costs, which are negligible for most use cases.
  • What permissions does my IAM user need for the AWS Cognito n8n integration?
    Your IAM user needs appropriate Cognito permissions to execute the actions in your workflows. For full functionality across all 13 actions, you can attach the managed policy "AmazonCognitoPowerUser" which grants read/write access to all Cognito resources. For production environments, we recommend creating a custom policy with only the specific permissions you need—for example, if you only need to read users, grant only "cognito-idp:ListUsers" and "cognito-idp:AdminGetUser". Always follow the principle of least privilege.
  • Can I trigger n8n workflows based on AWS Cognito events?
    While the native AWS Cognito n8n integration focuses on actions (outbound operations), you can trigger workflows from Cognito events using AWS Lambda triggers combined with n8n webhooks. Configure Cognito to invoke a Lambda function on events like user sign-up or authentication, then have that Lambda call an n8n webhook URL. This gives you event-driven automation—for example, automatically sending a welcome email sequence via Brevo when a new user confirms their account, or logging authentication events to your security dashboard.
Hack'celeration Lab

Get our weekly integration tips.

No spam. Unsubscribe anytime.