We use it as a dedicated solution. We use it to authenticate our web applications.
Snr. Developer at Mama Money Pty
The multi-factor authentication setup needs to be improved
Pros and Cons
- "The multi-factor authentication setup has room for improvement."
- "You need to evaluate the export users. The multifactor authentication, much less this room for improving the configuration setup of that."
What is our primary use case?
What is most valuable?
Setting up groups is easy, as well as assigning users to groups.
What needs improvement?
You need to evaluate the export users. The multi-factor authentication setup has room for improvement.
For how long have I used the solution?
I have been using Amazon Cognito for three years.
Buyer's Guide
Amazon Cognito
March 2026
Learn what your peers think about Amazon Cognito. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,976 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is a scalable solution.
How was the initial setup?
The initial setup is not straightforward.
What other advice do I have?
I would rate the overall solution a four out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Amazon Cognito Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Access ManagementPopular Comparisons
Microsoft Entra ID
Cloudflare One
Okta Platform
Ping Identity Platform
Auth0 Platform
OneLogin
ForgeRock
F5 BIG-IP Access Policy Manager (APM)
Symantec Siteminder
SecureAuth Identity Platform
Thales SafeNet Trusted Access
Gluu Flex
Fastpath Platform
Fischer Identity Access Management
Buyer's Guide
Download our free Amazon Cognito Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the Top 5 cybersecurity trends in 2022?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are security features to look out for when choosing a Customer Identity and Access Management solution?
- Why is identity and access management (IAM) so important in preventing data breaches?
- What access management tools would you recommend to help with GDPR compliance?
- When evaluating Access Management, what aspect do you think is the most important to look for?
- Which is the best choice of Zero Trust Network Access (ZTNA)?
- What are some tips for managing the identity lifecycle securely and effectively?
- What is the difference between IDAM , PIM and PAM?














