Skip to content

Commit c659acf

Browse files
author
Dane Pilcher
committed
add some addtional details
1 parent e2b26f2 commit c659acf

File tree

1 file changed

+3
-1
lines changed
  • src/pages/[platform]/build-a-backend/data/customize-authz/public-data-access

1 file changed

+3
-1
lines changed

src/pages/[platform]/build-a-backend/data/customize-authz/public-data-access/index.mdx

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ do {
114114

115115
### Extend API Key Expiration
116116

117-
If the API key has not expired, you can extend the expiration date by deploying your app again. The API key expiration date will be set to `expiresInDays` from the current date when the app is deployed. In the example below, the API key will expire 7 days from the last deployment.
117+
If the API key has not expired, you can extend the expiration date by deploying your app again. The API key expiration date will be set to `expiresInDays` days from the date when the app is deployed. In the example below, the API key will expire 7 days from the latest deployment.
118118

119119
```ts title="amplify/data/resource.ts"
120120
export const data = defineData({
@@ -156,6 +156,8 @@ const backend = defineBackend({
156156
// );
157157
```
158158

159+
A new API key will be created for your app.
160+
159161
## Add public authorization rule using Amazon Cognito identity pool's unauthenticated role
160162

161163
You can also override the authorization provider. In the example below, `identityPool` is specified as the provider which allows you to use an "Unauthenticated Role" from the Cognito identity pool for public access instead of an API key. Your Auth resources defined in `amplify/auth/resource.ts` generates scoped down IAM policies for the "Unauthenticated role" in the Cognito identity pool automatically.

0 commit comments

Comments
 (0)