Each and every application needs users and therefore, they need to verify the identity of those users. Increasingly, and with good reason, that functionality is outsourced to a third-party provider, with AWS Cognito being one of the most used examples. This talk will cover some of the most common patterns of authentications used with Cognito, and how you can actually manage modern authentication for your product.