feat: token exchange example with real setup with different client id…#1234
Conversation
…s to authenticate calls to AgentCore Gateway and API Gateway
|
Latest scan for commit: Security Scan ResultsScan Metadata
SummaryScanner ResultsThe table below shows findings by scanner, with status based on severity thresholds and dependencies: Column Explanations: Severity Levels (S/C/H/M/L/I):
Other Columns:
Scanner Results:
Severity Thresholds (Thresh Column):
Threshold Source: Values in parentheses indicate where the threshold is configured:
Statistics calculation:
Detailed FindingsShow 27 actionable findingsFinding 1: SECRET-SECRET-KEYWORD
Description: Code Snippet: Finding 2: CKV_AWS_355
Description: Code Snippet: Finding 3: CKV_AWS_290
Description: Code Snippet: Finding 4: CKV_AWS_237
Description: Code Snippet: Finding 5: CKV_AWS_120
Description: Code Snippet: Finding 6: CKV_AWS_73
Description: Code Snippet: Finding 7: CKV_AWS_76
Description: Code Snippet: Finding 8: CKV_AWS_117
Description: Code Snippet: Finding 9: CKV_AWS_50
Description: Code Snippet: Finding 10: CKV_AWS_116
Description: Code Snippet: Finding 11: CKV_AWS_115
Description: Code Snippet: Finding 12: CKV_AWS_272
Description: Code Snippet: Finding 13: CKV_AWS_117
Description: Code Snippet: Finding 14: CKV_AWS_173
Description: Code Snippet: Finding 15: CKV_AWS_50
Description: Code Snippet: Finding 16: CKV_AWS_116
Description: Code Snippet: Finding 17: CKV_AWS_115
Description: Code Snippet: Finding 18: CKV_AWS_272
Description: Code Snippet: Finding 19: CKV2_AWS_4
Description: Code Snippet: Finding 20: CKV2_AWS_51
Description: Code Snippet: Finding 21: CKV2_AWS_29
Description: Code Snippet: Finding 22: CKV_SECRET_6
Description: Code Snippet: Finding 23: terraform.aws.security.aws-lambda-x-ray-tracing-not-active.aws-lambda-x-ray-tracing-not-active
Description: Code Snippet: Finding 24: terraform.aws.security.aws-lambda-x-ray-tracing-not-active.aws-lambda-x-ray-tracing-not-active
Description: Code Snippet: Finding 25: terraform.aws.security.aws-lambda-environment-unencrypted.aws-lambda-environment-unencrypted
Description: Code Snippet: Finding 26: python.lang.security.audit.logging.logger-credential-leak.python-logger-credential-disclosure
Description: Code Snippet: Finding 27: python.lang.security.audit.logging.logger-credential-leak.python-logger-credential-disclosure
Description: Code Snippet: Report generated by Automated Security Helper (ASH) at 2026-04-01T16:09:39+00:00 |
Token exchange example via Gateway Interceptor with realistic setup and terraform IaC that uses different client_ids to authenticate calls to AgentCore Gateway and API Gateway.
Amazon Bedrock AgentCore Samples Pull Request
Important
review readylabel to it. Only PRs withreview readywill be reviewed.Issue number: #1233
Concise description of the PR
User experience
Before: need to use Jupyter Notebook to deploy the infrastructure which is not a familiar tool for backend and full-stack developers. Token propagation is faked and the new token is sent as part of the payload instead of an auth header and correctly used.
After: use Terraform for IaC which is the mostly used IaC tool by our customer. Correctly propagate token to the Authorization header to the target and shows the full e2e auth flow.
Checklist
If your change doesn't seem to apply, please leave them unchecked.
Acknowledgment
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the project license.