

本文属于机器翻译版本。若本译文内容与英语原文存在差异，则一律以英文原文为准。

# 亚马逊 Cognito 正在登录 AWS CloudTrail
<a name="logging-using-cloudtrail"></a>

Amazon Cognito 与 AWS CloudTrail一项服务集成，可记录用户、角色或 AWS 服务在 Amazon Cognito 中执行的操作。 CloudTrail 捕获一部分 Amazon Cognito 的 API 调用作为事件，包括来自亚马逊 Cognito 控制台的调用和对亚马逊 Cognito API 操作的代码调用。如果您创建了跟踪，则可以选择将 CloudTrail 事件传送到 Amazon S3 存储桶，包括 Amazon Cognito 的事件。如果您未配置跟踪，您仍然可以在 CloudTrail 控制台的 “事件**历史记录” 中查看最新的事件**。通过收集的信息 CloudTrail，您可以确定向 Amazon Cognito 发出的请求、发出请求的 IP 地址、谁提出了请求、何时提出请求以及其他详细信息。

要了解更多信息 CloudTrail，包括如何配置和激活它，请参阅《[AWS CloudTrail 用户指南》](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/)。

您还可以为特定 CloudTrail 事件创建 Amazon CloudWatch 警报。例如，您可以设置 CloudWatch ，以在身份池配置发生更改时触发警报。有关更多信息，请参阅[为 CloudTrail 事件创建 CloudWatch 警报：示例](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudwatch-alarms-for-cloudtrail.html)。

**Topics**
+ [亚马逊 Cognito 发送到的信息 CloudTrail](#amazon-cognito-info-in-cloudtrail)
+ [使用亚马逊日志见解分析 Amazon Cognito CloudTrail 事件 CloudWatch](#analyzingcteventscwinsight)
+ [示例 Amazon Cognito 事件](understanding-amazon-cognito-entries.md)

## 亚马逊 Cognito 发送到的信息 CloudTrail
<a name="amazon-cognito-info-in-cloudtrail"></a>

CloudTrail 在您创建时已开启 AWS 账户。**当 Amazon Cognito 中出现支持的事件活动时，该活动会与其他 AWS 服务 CloudTrail 事件一起记录在事件历史记录中。**您可以在自己的 AWS 账户中查看、搜索和下载最近发生的事件。有关更多信息，请参阅[使用事件历史查看 CloudTrail 事件](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/view-cloudtrail-events.html)。

要持续记录您的 AWS 账户中的事件，包括 Amazon Cognito 的事件，请创建跟踪。 CloudTrail 跟踪将日志文件传输到 Amazon S3 存储桶。预设情况下，在控制台中创建跟踪时，此跟踪应用于所有 区域。跟踪记录 AWS 分区中所有区域的事件，并将日志文件传送到您指定的 Amazon S3 存储桶。此外，您可以配置其他 AWS 服务，以进一步分析和处理 CloudTrail 日志中收集的事件数据。有关更多信息，请参阅: 
+ [创建跟踪概览](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-create-and-update-a-trail.html)
+ [CloudTrail 支持的服务和集成](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-aws-service-specific-topics.html#cloudtrail-aws-service-specific-topics-list)
+ [为以下各项配置亚马逊 SNS 通知 CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/getting_notifications_top_level.html)
+ [接收来自多个地区的 CloudTrail 日志文件](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-log-files-from-multiple-regions.html)和[接收来自多个账户的 CloudTrail日志文件](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-receive-logs-from-multiple-accounts.html)

每个事件或日志条目都包含有关生成请求的人员信息。身份信息可帮助您确定以下内容：
+ 请求是使用根用户凭证还是 IAM 用户凭证发出的。
+ 请求是使用角色还是联合用户的临时安全凭证发出的。
+ 请求是否由其他 AWS 服务发出。

有关更多信息，请参阅 [CloudTrail userIdentity 元素](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-user-identity.html)。

**中的机密数据 AWS CloudTrail**  
由于用户池和身份池会处理用户数据，因此 Amazon Cognito 会使用该值掩盖 CloudTrail 事件中的一些私有字段。`HIDDEN_DUE_TO_SECURITY_REASONS`有关 Amazon Cognito 未填充到事件的字段的示例，请参阅[示例 Amazon Cognito 事件](understanding-amazon-cognito-entries.md)。Amazon Cognito 只会掩盖一些通常包含用户信息的字段，例如密码和令牌。Amazon Cognito 不会自动检测或屏蔽您在 API 请求中填充到非私有字段的个人身份信息。

### 用户池事件
<a name="user-pools-cloudtrail-events"></a>

Amazon Cognito 支持将[用户池操作页面上列出的所有操作](https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/API_Operations.html)作为事件 CloudTrail 记录在日志文件中。Amazon Cognito 将用户池事件记录 CloudTrail 为*管理*事件。

Amazon Cognito 用户池 CloudTrail 条目中的`eventType`字段告诉你你的应用程序是向 [Amazon Cognito 用户池](https://docs.aws.amazon.com/cognito-user-identity-pools/latest/APIReference/Welcome.html) API 发出请求，还是向[为 OpenID Connect、SAML 2.0 或托管登录页面提供资源的终端节点](cognito-userpools-server-contract-reference.md)发出请求。API 请求的 `AwsApiCall` 为 `eventType`，端点请求的 `AwsServiceEvent` 为 `eventType`。

Amazon Cognito 将以下请求作为事件记录到您的托管登录服务。 CloudTrail

------
#### [ Hosted UI (classic) events ]


**在中托管用户界面（经典）活动 CloudTrail**  

| 操作 | 说明 | 
| --- | --- | 
| Login\$1GET, CognitoAuthentication | 用户查看或向您的 [登录端点](login-endpoint.md) 提交凭证。 | 
| OAuth2\$1Authorize\$1GET, Beta\$1Authorize\$1GET | 用户查看您的 [对端点授权](authorization-endpoint.md)。 | 
| OAuth2Response\$1GET, OAuth2Response\$1POST | 用户向您的 /oauth2/idpresponse 端点提交 IdP 令牌。 | 
| SAML2Response\$1POST, Beta\$1SAML2Response\$1POST | 用户向您的 /saml2/idpresponse 端点提交 IdP SAML 断言。 | 
| Login\$1OIDC\$1SAML\$1POST | 用户在您的 [登录端点](login-endpoint.md) 中输入用户名并与 [IdP 标识符](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-integrating-3rd-party-saml-providers.html)匹配。 | 
| Token\$1POST, Beta\$1Token\$1POST | 用户向您的 [令牌端点](token-endpoint.md) 提交授权码。 | 
| Signup\$1GET, Signup\$1POST | 用户向您的 /signup 端点提交注册信息。 | 
| Confirm\$1GET, Confirm\$1POST | 用户在托管 UI 中提交确认码。 | 
| ResendCode\$1POST | 用户在托管 UI 中提交重新发送确认码的请求。 | 
| ForgotPassword\$1GET, ForgotPassword\$1POST | 用户向您的 /forgotPassword 端点提交重置密码的请求。 | 
| ConfirmForgotPassword\$1GET, ConfirmForgotPassword\$1POST | 用户向您的 /confirmForgotPassword 端点提交代码以确认其 ForgotPassword 请求。 | 
| ResetPassword\$1GET, ResetPassword\$1POST | 用户在托管 UI 中提交新密码。 | 
| Mfa\$1GET, Mfa\$1POST | 用户在托管 UI 中提交多重身份验证（MFA）代码。 | 
| MfaOption\$1GET, MfaOption\$1POST | 用户在托管 UI 中选择其首选 MFA 方法。 | 
| MfaRegister\$1GET, MfaRegister\$1POST | 用户在注册 MFA 时，在托管 UI 中提交多重身份验证（MFA）代码。 | 
| Logout | 用户在您的 /logout 端点注销。 | 
| SAML2Logout\$1POST | 用户在您的 /saml2/logout 端点注销。 | 
| Error\$1GET | 用户在托管 UI 中查看错误页面。 | 
| UserInfo\$1GET, UserInfo\$1POST | 用户或 IdP 与您的 [userInfo 端点](userinfo-endpoint.md) 交换信息。 | 
| Confirm\$1With\$1Link\$1GET | 用户根据 Amazon Cognito 在电子邮件中发送的链接提交确认。 | 
| Event\$1Feedback\$1GET | 用户向 Amazon Cognito 提交有关[威胁防护](cognito-user-pool-settings-threat-protection.md)事件的反馈。 | 

------
#### [ Managed login events ]


**中的托管登录事件 CloudTrail**  

| 操作 | 说明 | 
| --- | --- | 
| login\$1POST | 用户向您的[登录端点](login-endpoint.md)提交凭证。 | 
| login\$1continue\$1POST | 已经登录过一次的用户选择再次登录。 | 
| forgotPassword\$1POST | 用户重置其密码。 | 
| selectChallenge\$1POST | 用户在提交用户名或凭证后对身份验证质询作出回应。 | 
| confirmUser\$1GET | 用户在[确认或验证电子邮件消息](signing-up-users-in-your-app.md)中打开链接。 | 
| mfa\$1back\$1POST | 用户在出现 MFA 提示后选择返回按钮。 | 
| mfa\$1options\$1POST | 用户选择 MFA 选项。 | 
| mfa\$1phone\$1register\$1POST | 用户提交电话号码以注册为一个 MFA 因素。此操作会导致 Amazon Cognito 向用户的电话号码发送 MFA 代码。 | 
| mfa\$1phone\$1verify\$1POST | 用户提交发送到其电话号码的 MFA 代码。 | 
| mfa\$1phone\$1resendCode\$1POST | 用户提交向其电话号码重新发送 MFA 代码的请求。 | 
| mfa\$1totp\$1POST | 用户提交 TOTP MFA 代码。 | 
| signup\$1POST | 用户向您的 /signup 托管登录页面提交信息。 | 
| signup\$1confirm\$1POST | 用户通过电子邮件或短信提交确认码。 | 
| verifyCode\$1POST | 用户提交一次性密码（OTP）以进行无密码身份验证。 | 
| passkeys\$1add\$1POST | 用户提交注册新的通行密钥凭证的请求。 | 
| passkeys\$1add\$1GET | 用户导航到可以注册通行密钥的页面。 | 
| login\$1passkey\$1POST | 用户使用通行密钥登录。 | 

------

**注意**  
Amazon Cognito 会记录特定`UserName`于用户的请求，`UserSub`但不记录在 CloudTrail 日志中。通过调用 `ListUsers` API，并使用主题筛选条件，您可以找到给定 `UserSub` 的用户。

### 身份池事件
<a name="identity-pools-cloudtrail-events"></a>

**数据事件**

*Amazon Cognito 将以下 Amazon Cognito 身份事件记录 CloudTrail 为数据事件。*[数据事件](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events)是大容量数据平面 API 操作， CloudTrail 默认情况下不记录。记录数据事件将收取额外费用。
+ [https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetCredentialsForIdentity.html](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetCredentialsForIdentity.html)
+ [https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetId.html](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetId.html)
+ [https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetOpenIdToken.html](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetOpenIdToken.html)
+ [https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetOpenIdTokenForDeveloperIdentity.html](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_GetOpenIdTokenForDeveloperIdentity.html)
+ [https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_UnlinkIdentity.html](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_UnlinkIdentity.html)

要为这些 API 操作生成 CloudTrail 日志，您必须激活跟踪中的数据事件，并为 **Cognito** 身份池选择事件选择器。有关更多信息，请参阅 *AWS CloudTrail 用户指南*中的[记录数据事件以便跟踪](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html)。

您还可以使用以下 CLI 命令将身份池事件选择器添加到您的跟踪记录中。

```
aws cloudtrail put-event-selectors --trail-name <trail name> --advanced-event-selectors \
"{\
   \"Name\": \"Cognito Selector\",\
   \"FieldSelectors\": [\
      {\
         \"Field\": \"eventCategory\",\
         \"Equals\": [\
            \"Data\"\
         ]\
      },\
      {\
         \"Field\": \"resources.type\",\
         \"Equals\": [\
            \"AWS::Cognito::IdentityPool\"\
         ]\
      }\
   ]\
}"
```

**管理事件**

*Amazon Cognito 将剩余的 Amazon Cognito 身份池 API 操作记录为管理事件。* CloudTrail 默认情况下会记录管理事件 API 操作。

有关 Amazon Cognito 登录 CloudTrail的亚马逊 Cognito 身份池 API 操作的列表，请参阅亚马逊 Co [gnito 身份池 API 参](https://docs.aws.amazon.com/cognitoidentity/latest/APIReference/API_Operations.html)考。

**Amazon Cognito Sync**

Amazon Cognito 将所有 Amazon Cognito 同步 API 操作记录为管理事件。有关 Amazon Cognito 登录 CloudTrail的亚马逊 Cognito Sync API 操作的列表，请参阅亚马逊 Cognito Sy [nc API 参考](https://docs.aws.amazon.com/cognitosync/latest/APIReference/API_Operations.html)。

## 使用亚马逊日志见解分析 Amazon Cognito CloudTrail 事件 CloudWatch
<a name="analyzingcteventscwinsight"></a>

您可以使用 Amazon Log CloudWatch s Insights 搜索和分析您的 Amazon Cognito CloudTrail 事件。当您将跟踪配置为向 CloudWatch Logs 发送事件时，仅 CloudTrail 发送与您的跟踪设置相匹配的事件。

要查询或研究您的 Amazon Cognito CloudTrail 事件，请在 CloudTrail 控制台中确保在跟踪设置中选择**管理事件**选项，以便您可以监控对资源执行的管理操作。 AWS 当您想要识别账户中的错误、异常活动或异常用户行为时，可以在跟踪记录设置中选择 **Insights 事件**选项。

### Amazon Cognito 查询的示例
<a name="analyzingcteventscwinsight-samplequeries"></a>

您可以在 Amazon CloudWatch 控制台中使用以下查询。

**常规查询**

查找 25 个最近添加的日志事件。

```
fields @timestamp, @message | sort @timestamp desc | limit 25
| filter eventSource = "cognito-idp.amazonaws.com"
```

获取 25 个最近添加的录入事件（包含异常）的列表。

```
fields @timestamp, @message | sort @timestamp desc | limit 25
| filter eventSource = "cognito-idp.amazonaws.com" and @message like /Exception/
```

**异常和错误查询**

查找最近添加的 25 个含错误代码 `NotAuthorizedException` 的录入事件以及 Amazon Cognito 用户池 `sub`。

```
fields @timestamp, additionalEventData.sub as user | sort @timestamp desc | limit 25
| filter eventSource = "cognito-idp.amazonaws.com" and errorCode= "NotAuthorizedException"
```

查找具有 `sourceIPAddress` 和相应 `eventName` 的记录数。

```
filter eventSource = "cognito-idp.amazonaws.com"
| stats count(*) by sourceIPAddress, eventName
```

查找触发 `NotAuthorizedException` 错误的前 25 个 IP 地址。

```
filter eventSource = "cognito-idp.amazonaws.com" and errorCode= "NotAuthorizedException"
| stats count(*) as count by sourceIPAddress, eventName
| sort count desc | limit 25
```

找到调用 `ForgotPassword` API 的前 25 个 IP 地址。

```
filter eventSource = "cognito-idp.amazonaws.com" and eventName = 'ForgotPassword'
| stats count(*) as count by sourceIPAddress
| sort count desc | limit 25
```

# 示例 Amazon Cognito 事件
<a name="understanding-amazon-cognito-entries"></a>

Amazon Cognito 会将 AWS CloudTrail 有关用户身份验证活动和管理管理活动的信息记录到。这适用于用户池和身份池。例如，您可以查看同一跟踪中的 `GetId` 和 `UpdateIdentityPool` 事件，或者 `UpdateAuthEventFeedback` 和 `SetRiskConfiguration` 事件。您还会将看到与用户池 API 中的操作不对应的托管 UI 活动的用户池日志。这一部分提供了一些您在实际使用中可能会看到的日志示例。要了解任何操作 CloudTrail 的事件架构，请为该操作生成请求并查看该操作在您的跟踪中创建的事件。

 跟踪可以将事件作为日志文件传输到您指定的 Amazon S3 存储桶。 CloudTrail 日志文件包含一个或多个日志条目。事件代表来自任何来源的单个请求，包括有关请求的操作、操作的日期和时间、请求参数等的信息。 CloudTrail 日志文件不是公共 API 调用的有序堆栈跟踪，因此它们不会按任何特定的顺序出现。

**Topics**
+ [托管用户界面注册的示例 CloudTrail 事件](#cognito-cloudtrail-events-federated-sign-up)
+ [SAML 请求的示例 CloudTrail 事件](#cognito-cloudtrail-event-saml-post)
+ [向令牌端点发出请求 CloudTrail 的事件示例](#cognito-cloudtrail-events-token-endpoint-requests)
+ [的示例 CloudTrail 事件 CreateIdentityPool](#cognito-cloudtrail-events-createidentitypool)
+ [的示例 CloudTrail 事件 GetCredentialsForIdentity](#cognito-cloudtrail-events-getcredentialsforidentity)
+ [的示例 CloudTrail 事件 GetId](#cognito-cloudtrail-events-getid)
+ [的示例 CloudTrail 事件 GetOpenIdToken](#cognito-cloudtrail-events-getopenidtoken)
+ [的示例 CloudTrail 事件 GetOpenIdTokenForDeveloperIdentity](#cognito-cloudtrail-events-getopenidtokenfordeveloperidentity)
+ [的示例 CloudTrail 事件 UnlinkIdentity](#cognito-cloudtrail-events-unlinkidentity)

## 托管用户界面注册的示例 CloudTrail 事件
<a name="cognito-cloudtrail-events-federated-sign-up"></a>

以下示例 CloudTrail 事件演示了用户通过托管用户界面注册时 Amazon Cognito 记录的信息。

当新用户导航到应用程序的登录页面时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-04-06T05:38:12Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Login_GET",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "errorCode": "",
    "errorMessage": "",
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200.0
        },
        "requestParameters":
        {
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "response_type":
            [
                "token"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        }
    },
    "eventID": "382ae09a-151d-4116-8f2b-6ac0a804a38c",
    "readOnly": true,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当新用户从应用程序的登录页面选择**注册**时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-05T23:21:43Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Signup_GET",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200
        },
        "requestParameters":
        {
            "response_type":
            [
                "code"
            ],
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "7a63e7c2-b057-4f3d-a171-9d9113264fff",
    "eventID": "5e7b27a0-6870-4226-adb4-f86cd51ac5d8",
    "readOnly": true,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当新用户选择用户名、输入电子邮件地址并从应用程序的登录页面选择密码时，Amazon Cognito 会记录以下事件。Amazon Cognito 不会将有关用户身份的识别信息记录到。 CloudTrail

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-05T23:22:05Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Signup_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 302
        },
        "requestParameters":
        {
            "password":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "requiredAttributes[email]":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "response_type":
            [
                "code"
            ],
            "_csrf":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "client_id":
            [
                "1example23456789"
            ],
            "username":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "9ad58dd8-3517-4aa8-96a5-d17a01df9eb4",
    "eventID": "c75eb7a5-eb8c-43d1-8331-f4412e756e69",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当新用户在注册后访问托管 UI 中的用户确认页面时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-05T23:22:06Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Confirm_GET",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200
        },
        "requestParameters":
        {
            "response_type":
            [
                "code"
            ],
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "58a5b170-3127-45bb-88cc-3e652d779e0b",
    "eventID": "7f87291a-6d50-409a-822f-e3a5ec7e60da",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当用户在托管 UI 的用户确认页面中输入 Amazon Cognito 通过电子邮件发送给他们的代码时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-05T23:23:32Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Confirm_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 302
        },
        "requestParameters":
        {
            "confirm":
            [
                ""
            ],
            "deliveryMedium":
            [
                "EMAIL"
            ],
            "sub":
            [
                "704b1e47-34fe-40e9-8c41-504997494531"
            ],
            "code":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "destination":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "response_type":
            [
                "code"
            ],
            "_csrf":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "cognitoAsfData":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "client_id":
            [
                "1example23456789"
            ],
            "username":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "9764300a-ed35-4f87-8a0f-b18b3fe2b11e",
    "eventID": "e24ac6e5-2f70-4c6e-ad4e-2f08a547bb36",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

## SAML 请求的示例 CloudTrail 事件
<a name="cognito-cloudtrail-event-saml-post"></a>

当使用您的 SAML IdP 进行身份验证的用户将 SAML 断言提交给您的 `/saml2/idpresponse` 端点时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-06T00:50:57Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "SAML2Response_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 302
        },
        "requestParameters":
        {
            "RelayState":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "SAMLResponse":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "4f6f15d1-c370-4a57-87f0-aac4817803f7",
    "eventID": "9824b50f-d9d1-4fb8-a2c1-6aa78ca5902a",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "625647942648",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

## 向令牌端点发出请求 CloudTrail 的事件示例
<a name="cognito-cloudtrail-events-token-endpoint-requests"></a>

以下是来自对 [令牌端点](token-endpoint.md) 的请求的示例事件。

当已通过身份验证并收到授权码的用户将代码提交到您的 `/oauth2/token` 端点时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-12T22:12:30Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Token_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200
        },
        "requestParameters":
        {
            "code":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "grant_type":
            [
                "authorization_code"
            ],
            "redirect_uri":
            [
                "https://www.amazon.com"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "f257f752-cc14-4c52-ad5b-152a46915238",
    "eventID": "0bd1586d-cd3e-4d7a-abaf-fd8bfc3912fd",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当您的后端系统向您的 `/oauth2/token` 端点提交访问令牌的 `client_credentials` 请求时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-12T21:07:05Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Token_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200
        },
        "requestParameters":
        {
            "grant_type":
            [
                "client_credentials"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "4f871256-6825-488a-871b-c2d9f55caff2",
    "eventID": "473e5cbc-a5b3-4578-9ad6-3dfdcb8a6d34",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

当您的应用程序与您的 `/oauth2/token` 端点交换刷新令牌以获取新 ID 和访问令牌时，Amazon Cognito 会记录以下事件。

```
{
    "eventVersion": "1.08",
    "userIdentity":
    {
        "accountId": "123456789012"
    },
    "eventTime": "2022-05-12T22:16:40Z",
    "eventSource": "cognito-idp.amazonaws.com",
    "eventName": "Token_POST",
    "awsRegion": "us-west-2",
    "sourceIPAddress": "192.0.2.1",
    "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)...",
    "requestParameters": null,
    "responseElements": null,
    "additionalEventData":
    {
        "responseParameters":
        {
            "status": 200
        },
        "requestParameters":
        {
            "refresh_token":
            [
                "HIDDEN_DUE_TO_SECURITY_REASONS"
            ],
            "grant_type":
            [
                "refresh_token"
            ],
            "client_id":
            [
                "1example23456789"
            ]
        },
        "userPoolDomain": "mydomain.auth.us-west-2.amazoncognito.com",
        "userPoolId": "us-west-2_EXAMPLE"
    },
    "requestID": "2829f0c6-a3a9-4584-b046-11756dfe8a81",
    "eventID": "12bd3464-59c7-44fa-b8ff-67e1cf092018",
    "readOnly": false,
    "eventType": "AwsServiceEvent",
    "managementEvent": true,
    "recipientAccountId": "123456789012",
    "serviceEventDetails":
    {
        "serviceAccountId": "111122223333"
    },
    "eventCategory": "Management"
}
```

## 的示例 CloudTrail 事件 CreateIdentityPool
<a name="cognito-cloudtrail-events-createidentitypool"></a>

以下示例是为进行 `CreateIdentityPool` 操作而发出的请求的日志条目。该请求由名为 Alice 的 IAM 用户发出。

```
{
    "eventVersion": "1.03",
    "userIdentity": {
        "type": "IAMUser",
        "principalId": "PRINCIPAL_ID",
        "arn": "arn:aws:iam::123456789012:user/Alice",
        "accountId": "123456789012",
        "accessKeyId": "['EXAMPLE_KEY_ID']",
        "userName": "Alice"
    },
    "eventTime": "2016-01-07T02:04:30Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "CreateIdentityPool",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "127.0.0.1",
    "userAgent": "USER_AGENT",
    "requestParameters": {
        "identityPoolName": "TestPool",
        "allowUnauthenticatedIdentities": true,
        "supportedLoginProviders": {
            "graph.facebook.com": "000000000000000"
        }
    },
    "responseElements": {
        "identityPoolName": "TestPool",
        "identityPoolId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE",
        "allowUnauthenticatedIdentities": true,
        "supportedLoginProviders": {
            "graph.facebook.com": "000000000000000"
        }
    },
    "requestID": "15cc73a1-0780-460c-91e8-e12ef034e116",
    "eventID": "f1d47f93-c708-495b-bff1-cb935a6064b2",
    "eventType": "AwsApiCall",
    "recipientAccountId": "123456789012"
}
```

## 的示例 CloudTrail 事件 GetCredentialsForIdentity
<a name="cognito-cloudtrail-events-getcredentialsforidentity"></a>

以下示例是为进行 `GetCredentialsForIdentity` 操作而发出的请求的日志条目。

```
{
    "eventVersion": "1.08",
    "userIdentity": {
        "type": "Unknown"
    },
    "eventTime": "2023-01-19T16:55:08Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "GetCredentialsForIdentity",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "192.0.2.4",
    "userAgent": "aws-cli/2.7.25 Python/3.9.11 Darwin/21.6.0 exe/x86_64 prompt/off command/cognito-identity.get-credentials-for-identity",
    "requestParameters": {
        "logins": {
            "cognito-idp.us-east-1.amazonaws.com/us-east-1_aaaaaaaaa": "HIDDEN_DUE_TO_SECURITY_REASONS"
        },
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE"
    },
    "responseElements": {
        "credentials": {
            "accessKeyId": "ASIAIOSFODNN7EXAMPLE",
            "sessionToken": "aAaAaAaAaAaAab1111111111EXAMPLE",
            "expiration": "Jan 19, 2023 5:55:08 PM"
        },
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE"
    },
    "requestID": "659dfc23-7c4e-4e7c-858a-1abce884d645",
    "eventID": "6ad1c766-5a41-4b28-b5ca-e223ccb00f0d",
    "readOnly": false,
    "resources": [{
        "accountId": "111122223333",
        "type": "AWS::Cognito::IdentityPool",
        "ARN": "arn:aws:cognito-identity:us-east-1:111122223333:identitypool/us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE"
    }],
    "eventType": "AwsApiCall",
    "managementEvent": false,
    "recipientAccountId": "111122223333",
    "eventCategory": "Data"
}
```

## 的示例 CloudTrail 事件 GetId
<a name="cognito-cloudtrail-events-getid"></a>

以下示例是为进行 `GetId` 操作而发出的请求的日志条目。

```
{
    "eventVersion": "1.08",
    "userIdentity": {
        "type": "Unknown"
    },
    "eventTime": "2023-01-19T16:55:05Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "GetId",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "192.0.2.4",
    "userAgent": "aws-cli/2.7.25 Python/3.9.11 Darwin/21.6.0 exe/x86_64 prompt/off command/cognito-identity.get-id",
    "requestParameters": {
        "identityPoolId": "us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE",
        "logins": {
            "cognito-idp.us-east-1.amazonaws.com/us-east-1_aaaaaaaaa": "HIDDEN_DUE_TO_SECURITY_REASONS"
        }
    },
    "responseElements": {
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE"
    },
    "requestID": "dc28def9-07c8-460a-a8f3-3816229e6664",
    "eventID": "c5c459d9-40ec-41fd-8f6b-57865d5a9975",
    "readOnly": false,
    "resources": [{
        "accountId": "111122223333",
        "type": "AWS::Cognito::IdentityPool",
        "ARN": "arn:aws:cognito-identity:us-east-1:111122223333:identitypool/us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE"
    }],
    "eventType": "AwsApiCall",
    "managementEvent": false,
    "recipientAccountId": "111122223333",
    "eventCategory": "Data"
}
```

## 的示例 CloudTrail 事件 GetOpenIdToken
<a name="cognito-cloudtrail-events-getopenidtoken"></a>

以下示例是为进行 `GetOpenIdToken` 操作而发出的请求的日志条目。

```
{
    "eventVersion": "1.08",
    "userIdentity": {
        "type": "Unknown"
    },
    "eventTime": "2023-01-19T16:55:08Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "GetOpenIdToken",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "192.0.2.4",
    "userAgent": "aws-cli/2.7.25 Python/3.9.11 Darwin/21.6.0 exe/x86_64 prompt/off command/cognito-identity.get-open-id-token",
    "requestParameters": {
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE",
        "logins": {
            "cognito-idp.us-east-1.amazonaws.com/us-east-1_aaaaaaaaa": "HIDDEN_DUE_TO_SECURITY_REASONS"
        }
    },
    "responseElements": {
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE"
    },
    "requestID": "a506ba18-10d7-4fdb-9548-a8187b2e38bb",
    "eventID": "19ffc1a6-6ed8-4580-a4e1-3062c5ce6457",
    "readOnly": false,
    "resources": [{
        "accountId": "111122223333",
        "type": "AWS::Cognito::IdentityPool",
        "ARN": "arn:aws:cognito-identity:us-east-1:111122223333:identitypool/us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE"
    }],
    "eventType": "AwsApiCall",
    "managementEvent": false,
    "recipientAccountId": "111122223333",
    "eventCategory": "Data"
}
```

## 的示例 CloudTrail 事件 GetOpenIdTokenForDeveloperIdentity
<a name="cognito-cloudtrail-events-getopenidtokenfordeveloperidentity"></a>

以下示例是为进行 `GetOpenIdTokenForDeveloperIdentity` 操作而发出的请求的日志条目。

```
{
    "eventVersion": "1.08",
    "userIdentity": {
        "type": "AssumedRole",
        "principalId": "AROA1EXAMPLE:johns-AssumedRoleSession",
        "arn": "arn:aws:sts::111122223333:assumed-role/Admin/johns-AssumedRoleSession",
        "accountId": "111122223333",
        "accessKeyId": "ASIAIOSFODNN7EXAMPLE",
        "sessionContext": {
            "sessionIssuer": {
                "type": "Role",
                "principalId": "AROA1EXAMPLE",
                "arn": "arn:aws:iam::111122223333:role/Admin",
                "accountId": "111122223333",
                "userName": "Admin"
            },
            "attributes": {
                "creationDate": "2023-01-19T16:53:14Z",
                "mfaAuthenticated": "false"
            }
        }
    },
    "eventTime": "2023-01-19T16:55:08Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "GetOpenIdTokenForDeveloperIdentity",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "27.0.3.154",
    "userAgent": "aws-cli/2.7.25 Python/3.9.11 Darwin/21.6.0 exe/x86_64 prompt/off command/cognito-identity.get-open-id-token-for-developer-identity",
    "requestParameters": {
        "tokenDuration": 900,
        "identityPoolId": "us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE",
        "logins": {
            "JohnsDeveloperProvider": "HIDDEN_DUE_TO_SECURITY_REASONS"
        }
    },
    "responseElements": {
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE"
    },
    "requestID": "b807df87-57e7-4dd6-b90c-b06f46a61c21",
    "eventID": "f26fed91-3340-4d70-91ae-cdf555547b76",
    "readOnly": false,
    "resources": [{
        "accountId": "111122223333",
        "type": "AWS::Cognito::IdentityPool",
        "ARN": "arn:aws:cognito-identity:us-east-1:111122223333:identitypool/us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE"
    }],
    "eventType": "AwsApiCall",
    "managementEvent": false,
    "recipientAccountId": "111122223333",
    "eventCategory": "Data"
}
```

## 的示例 CloudTrail 事件 UnlinkIdentity
<a name="cognito-cloudtrail-events-unlinkidentity"></a>

以下示例是为进行 `UnlinkIdentity` 操作而发出的请求的日志条目。

```
{
    "eventVersion": "1.08",
    "userIdentity": {
        "type": "Unknown"
    },
    "eventTime": "2023-01-19T16:55:08Z",
    "eventSource": "cognito-identity.amazonaws.com",
    "eventName": "UnlinkIdentity",
    "awsRegion": "us-east-1",
    "sourceIPAddress": "192.0.2.4",
    "userAgent": "aws-cli/2.7.25 Python/3.9.11 Darwin/21.6.0 exe/x86_64 prompt/off command/cognito-identity.unlink-identity",
    "requestParameters": {
        "logins": {
            "cognito-idp.us-east-1.amazonaws.com/us-east-1_aaaaaaaaa": "HIDDEN_DUE_TO_SECURITY_REASONS"
        },
        "identityId": "us-east-1:1cf667a2-49a6-454b-9e45-23199EXAMPLE",
        "loginsToRemove": ["cognito-idp.us-east-1.amazonaws.com/us-east-1_aaaaaaaaa"]
    },
    "responseElements": null,
    "requestID": "99c2c8e2-9c29-416f-bb17-b650a5cbada9",
    "eventID": "d8e26126-202a-43c2-b458-3f225efaedc7",
    "readOnly": false,
    "resources": [{
        "accountId": "111122223333",
        "type": "AWS::Cognito::IdentityPool",
        "ARN": "arn:aws:cognito-identity:us-east-1:111122223333:identitypool/us-east-1:2dg778b3-50b7-565c-0f56-34200EXAMPLE"
    }],
    "eventType": "AwsApiCall",
    "managementEvent": false,
    "recipientAccountId": "111122223333",
    "eventCategory": "Data"
}
```