<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Tanseer</title>
    <description>The latest articles on Forem by Tanseer (@tanseer).</description>
    <link>https://forem.com/tanseer</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3901526%2Faae5933f-439d-4185-ad46-10b5e922d96c.jpg</url>
      <title>Forem: Tanseer</title>
      <link>https://forem.com/tanseer</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/tanseer"/>
    <language>en</language>
    <item>
      <title>AWS Amplify Cache Is Useless — And Here Is the Data to Prove It</title>
      <dc:creator>Tanseer</dc:creator>
      <pubDate>Wed, 29 Apr 2026 06:47:04 +0000</pubDate>
      <link>https://forem.com/aws-builders/aws-amplify-cache-is-useless-and-here-is-the-data-to-prove-it-2jn3</link>
      <guid>https://forem.com/aws-builders/aws-amplify-cache-is-useless-and-here-is-the-data-to-prove-it-2jn3</guid>
      <description>&lt;h2&gt;
  
  
  Who This Is For
&lt;/h2&gt;

&lt;p&gt;If you are deploying a frontend or full-stack app on AWS Amplify and your builds feel slower than they should be, this blog is worth reading. We are going to talk about Amplify's caching system — what it is supposed to do, what it actually does, and why in my experience it makes things worse, not better.&lt;/p&gt;

&lt;p&gt;No deep AWS knowledge is required. If you know what a build pipeline is and have used Amplify at least once, you will follow this completely.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Problem I Ran Into
&lt;/h2&gt;

&lt;p&gt;I was deploying an app on AWS Amplify. The build had two phases: install packages and build the app. Pretty standard setup.&lt;/p&gt;

&lt;p&gt;The total build time was sitting at around 9 minutes. That felt too long. So I opened the build logs and started looking at where the time was actually going.&lt;/p&gt;

&lt;p&gt;Here is what I found:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;3 minutes to restore cache (fetch previously stored files)&lt;/li&gt;
&lt;li&gt;3 minutes to install packages and build the app&lt;/li&gt;
&lt;li&gt;3 minutes to save cache (store files for the next build)
So out of 9 minutes, the actual work — installing and building — was only 3 minutes. The other 6 minutes were spent entirely on cache operations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That immediately felt wrong. Cache is supposed to speed things up. If it is consuming twice the time of the actual build, something is broken.&lt;/p&gt;




&lt;h2&gt;
  
  
  The First Experiment: Disable Cache Entirely
&lt;/h2&gt;

&lt;p&gt;My first instinct was simple. What if I just removed the cache configuration completely and let Amplify install everything fresh every time?&lt;/p&gt;

&lt;p&gt;I removed the cache settings from my &lt;code&gt;amplify.yml&lt;/code&gt; build config and triggered a new build.&lt;/p&gt;

&lt;p&gt;The result: 3 minutes and 30 seconds.&lt;/p&gt;

&lt;p&gt;The build went from 9 minutes to 3 minutes 30 seconds just by removing cache. Yes, it took an extra 30 seconds to download packages compared to the ideal cached scenario. But it saved 6 full minutes of cache overhead.&lt;/p&gt;

&lt;p&gt;This alone should raise a flag. The cache was not saving time. It was adding time.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Is Amplify Cache, Exactly?
&lt;/h2&gt;

&lt;p&gt;Before going further, let me explain how Amplify's caching works, because understanding the mechanism is key to understanding why it fails.&lt;/p&gt;

&lt;p&gt;When Amplify runs a build, it can be configured to save certain folders — most commonly &lt;code&gt;node_modules&lt;/code&gt; — by zipping them up and storing them in S3 (AWS's file storage service). On the next build, it fetches that zip, unzips it into the build environment, and in theory your packages are already there so the install step is faster.&lt;/p&gt;

&lt;p&gt;The key operation here is: zip and upload after a build, download and unzip before the next build.&lt;/p&gt;

&lt;p&gt;This is how Amplify's cache model works. It is essentially just copying folders in and out of storage between builds.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Second Experiment: Maybe It Is My Project
&lt;/h2&gt;

&lt;p&gt;After the first result, I thought maybe the problem was specific to my project. I had a reasonably large dependency tree. Maybe the &lt;code&gt;node_modules&lt;/code&gt; folder was so big that zipping and unzipping it was always going to take longer than just reinstalling.&lt;/p&gt;

&lt;p&gt;So I created a minimal test project — a simple website with almost no packages. Just enough to have a &lt;code&gt;package.json&lt;/code&gt; and a basic build step. The kind of project where &lt;code&gt;node_modules&lt;/code&gt; is tiny and cache should be trivially fast.&lt;/p&gt;

&lt;p&gt;I deployed it on Amplify with cache enabled.&lt;/p&gt;

&lt;p&gt;Same result. Amplify spent time fetching the cache, and then installed all dependencies from scratch anyway. The cache folder it had stored from the previous build was essentially ignored from a practical standpoint.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Root Cause: Cache and npm Are Fundamentally Incompatible
&lt;/h2&gt;

&lt;p&gt;After these experiments, I did some digging and found the real reason this does not work. It comes down to how npm (the package manager) behaves versus how Amplify's cache model works.&lt;/p&gt;

&lt;p&gt;Amplify caches folders. That is it. It saves a folder, restores a folder.&lt;/p&gt;

&lt;p&gt;But here is the problem:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you use &lt;code&gt;npm ci&lt;/code&gt;&lt;/strong&gt; (which is the recommended command for CI/CD pipelines because it gives you clean, reproducible installs), it deletes &lt;code&gt;node_modules&lt;/code&gt; entirely before installing. Every single time. It does not matter that Amplify just spent 3 minutes restoring that folder. &lt;code&gt;npm ci&lt;/code&gt; will delete it and start over.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If you use &lt;code&gt;npm install&lt;/code&gt;&lt;/strong&gt; (the more common development command), it does not always delete &lt;code&gt;node_modules&lt;/code&gt;, but it re-evaluates the dependency tree and may reinstall or update packages depending on what it finds. So even here, the cache is not reliably used.&lt;/p&gt;

&lt;p&gt;In both cases, the cached &lt;code&gt;node_modules&lt;/code&gt; folder is either deleted outright or partially ignored.&lt;/p&gt;

&lt;p&gt;Amplify's own documentation recommends using &lt;code&gt;npm ci&lt;/code&gt; for builds. But &lt;code&gt;npm ci&lt;/code&gt; by design destroys exactly what Amplify's cache tries to preserve. These two things directly contradict each other.&lt;/p&gt;

&lt;p&gt;The cache model and the install command are working against each other.&lt;/p&gt;




&lt;h2&gt;
  
  
  A Simple Way to Think About It
&lt;/h2&gt;

&lt;p&gt;Imagine you spend 10 minutes carefully organizing your desk every night before bed so it is ready for tomorrow. But every morning, the first thing you do is clear everything off the desk and start fresh. The organizing you did the night before is completely wasted.&lt;/p&gt;

&lt;p&gt;That is exactly what is happening here. Amplify organizes the &lt;code&gt;node_modules&lt;/code&gt; folder into cache. npm wipes the desk clean every build.&lt;/p&gt;




&lt;h2&gt;
  
  
  What the Numbers Look Like Side by Side
&lt;/h2&gt;

&lt;p&gt;To make this concrete, here is a comparison of what I observed:&lt;/p&gt;

&lt;p&gt;With cache enabled:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Restore cache: ~3 minutes&lt;/li&gt;
&lt;li&gt;Install and build: ~3 minutes&lt;/li&gt;
&lt;li&gt;Save cache: ~3 minutes&lt;/li&gt;
&lt;li&gt;Total: ~9 minutes
With cache disabled:&lt;/li&gt;
&lt;li&gt;Install and build: ~3 minutes 30 seconds&lt;/li&gt;
&lt;li&gt;Total: ~3 minutes 30 seconds
The "optimized" build with cache took more than twice as long as the build with no cache at all.&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What You Should Do Instead
&lt;/h2&gt;

&lt;p&gt;Based on everything above, my recommendation is straightforward: disable Amplify cache unless you have a very specific reason to use it and have verified it is actually helping.&lt;/p&gt;

&lt;p&gt;To disable it, remove or empty the &lt;code&gt;cache&lt;/code&gt; section from your &lt;code&gt;amplify.yml&lt;/code&gt;. Here is what a build config without cache looks like:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="m"&gt;1&lt;/span&gt;
&lt;span class="na"&gt;frontend&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;phases&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;preBuild&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="na"&gt;commands&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;npm ci&lt;/span&gt;
    &lt;span class="na"&gt;build&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="na"&gt;commands&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
        &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s"&gt;npm run build&lt;/span&gt;
  &lt;span class="na"&gt;artifacts&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="na"&gt;baseDirectory&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;build&lt;/span&gt;
    &lt;span class="na"&gt;files&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
      &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="s1"&gt;'&lt;/span&gt;&lt;span class="s"&gt;**/*'&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No cache block. Clean and simple.&lt;/p&gt;

&lt;p&gt;If your builds are still slow after removing cache, the bottleneck is likely somewhere else — large dependencies, slow build tools, or the build machine itself. Those are worth investigating separately, but at least you will not be wasting time on a cache that is not working.&lt;/p&gt;




&lt;h2&gt;
  
  
  My Conclusion
&lt;/h2&gt;

&lt;p&gt;AWS Amplify's cache feature is built on a model that zips and unzips folders between builds. That model does not account for how npm actually works. &lt;code&gt;npm ci&lt;/code&gt; deletes &lt;code&gt;node_modules&lt;/code&gt; before every install. &lt;code&gt;npm install&lt;/code&gt; may partially reinstall anyway. The result is that the cache restore step costs real time — in my case, 3 minutes per build — and delivers no actual benefit.&lt;/p&gt;

&lt;p&gt;I tested this on a large app and a minimal app. I tried &lt;code&gt;npm ci&lt;/code&gt; and &lt;code&gt;npm install&lt;/code&gt;. I made sure cache folders were correctly configured and permissions were in place. In every scenario, disabling cache made builds faster.&lt;/p&gt;

&lt;p&gt;This feels like a fundamental design mismatch between Amplify's caching mechanism and how modern package managers work.&lt;/p&gt;




&lt;h2&gt;
  
  
  Has This Happened to You?
&lt;/h2&gt;

&lt;p&gt;I am genuinely curious whether other developers have experienced this. Have you found a way to make Amplify cache actually work? Did you measure a real improvement? Or did you hit the same wall?&lt;/p&gt;

&lt;p&gt;Drop a comment or reach out — I would love to hear if someone has cracked this or if this is a widely shared frustration in the community.&lt;/p&gt;




&lt;h2&gt;
  
  
  Need Help With Your Amplify Setup?
&lt;/h2&gt;

&lt;p&gt;If you are running into build time issues or anything else with your Amplify deployment, feel free to reach out. Happy to help.&lt;/p&gt;

&lt;p&gt;Email me at &lt;strong&gt;&lt;a href="mailto:khantanseer43@gmail.com"&gt;khantanseer43@gmail.com&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;




</description>
      <category>aws</category>
      <category>amplify</category>
      <category>serverless</category>
      <category>cicd</category>
    </item>
    <item>
      <title>Your AWS Cognito Emails Are Going to Spam — Here Is How to Fix It Step by Step</title>
      <dc:creator>Tanseer</dc:creator>
      <pubDate>Wed, 29 Apr 2026 06:28:10 +0000</pubDate>
      <link>https://forem.com/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-41b9</link>
      <guid>https://forem.com/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-41b9</guid>
      <description>&lt;p&gt;A beginner-friendly guide to setting up SPF, DKIM, DMARC, Amazon SES, and custom email templates so your emails actually reach the inbox&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who This Guide Is For&lt;/strong&gt;&lt;br&gt;
If you are building an app on AWS and using Cognito to handle user sign-up and login, you have probably noticed that Cognito sends emails automatically — a verification email when someone signs up, and a password reset email when they forget their password.&lt;br&gt;
But if those emails are landing in spam, or not arriving at all, this guide is for you.&lt;br&gt;
We are going to fix that problem from scratch. No prior knowledge of email infrastructure is assumed. Every term will be explained.&lt;/p&gt;

&lt;p&gt;What Is the Problem, Exactly?&lt;br&gt;
When your app sends an email from something like &lt;a href="mailto:no-reply@yourdomain.com"&gt;no-reply@yourdomain.com&lt;/a&gt;, the email does not go directly from your laptop to the user's inbox. It travels through mail servers, and along the way, the receiving server (Gmail, Outlook, etc.) checks a simple question:&lt;br&gt;
"Can I trust that this email actually came from this domain?"&lt;br&gt;
If the answer is unclear or no, the email gets flagged as spam — or silently dropped.&lt;br&gt;
To answer that question, three things need to be in place on your domain: SPF, DKIM, and DMARC. These are DNS records (small pieces of configuration stored on your domain) that prove your emails are legitimate.&lt;br&gt;
We will set all of them up in this guide.&lt;/p&gt;

&lt;p&gt;The Stack We Are Working With&lt;br&gt;
Here is what this guide assumes:&lt;/p&gt;

&lt;p&gt;You have an AWS account&lt;br&gt;
You have a Cognito User Pool set up (or are planning to set one up)&lt;br&gt;
Your domain is managed in Route 53 (AWS's DNS service)&lt;br&gt;
You want Cognito to send emails from your custom domain, like &lt;a href="mailto:no-reply@yourdomain.com"&gt;no-reply@yourdomain.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If your domain is with GoDaddy, Namecheap, or another provider, the DNS steps will look slightly different in their interface, but the records you need to add are identical.&lt;/p&gt;

&lt;p&gt;Step 1: Understand What Amazon SES Is&lt;br&gt;
Before we do anything, let us understand a key service: Amazon SES.&lt;br&gt;
SES stands for Simple Email Service. It is AWS's service for sending emails. By default, Cognito uses its own basic email system, which has very low sending limits and no support for custom domains. That is why emails look generic and often end up in spam.&lt;br&gt;
The fix is to connect Cognito to SES, and configure SES properly with your domain. SES is free for low volumes, and the setup is a one-time thing.&lt;/p&gt;

&lt;p&gt;Step 2: Verify Your Domain in Amazon SES&lt;br&gt;
Before SES can send emails on behalf of your domain, it needs to confirm that you actually own it. This is called domain verification.&lt;br&gt;
Here is how to do it:&lt;/p&gt;

&lt;p&gt;Log in to the AWS Console and search for "Amazon SES" in the top search bar.&lt;br&gt;
In the left sidebar, click "Verified identities".&lt;br&gt;
Click "Create identity".&lt;br&gt;
Choose "Domain" and type your domain name (for example, mydomain.com).&lt;br&gt;
If your domain is in Route 53, check the option that says "Use Route 53 to publish DNS records automatically." AWS will handle the DNS setup for you.&lt;br&gt;
Click "Create identity".&lt;/p&gt;

&lt;p&gt;If you are not using Route 53, SES will show you a CNAME record that you need to manually add in your DNS provider's dashboard. Copy it exactly as shown and add it there.&lt;br&gt;
Once AWS detects the record, the status will change to "Verified". This can take anywhere from a few minutes to a couple of hours.&lt;/p&gt;

&lt;p&gt;Step 3: Set Up DKIM&lt;br&gt;
DKIM stands for DomainKeys Identified Mail. Think of it like a wax seal on a letter — it proves the email came from you and was not tampered with in transit.&lt;br&gt;
Every email sent through SES gets a digital signature. The receiving server checks that signature against a public key stored in your DNS. If they match, the email is trusted.&lt;br&gt;
When you verified your domain in the previous step, SES automatically generated DKIM keys for you. You just need to add the DNS records.&lt;br&gt;
SES will show you three CNAME records under the "DKIM signatures" section of your verified identity. If you used Route 53 automatic publishing, these are already added. If not, copy all three and add them as CNAME records in your DNS provider.&lt;br&gt;
Once AWS confirms the records are live, DKIM status will show "Verified."&lt;/p&gt;

&lt;p&gt;Step 4: Set Up SPF&lt;br&gt;
SPF stands for Sender Policy Framework. It is a DNS record that tells the world which servers are allowed to send email from your domain.&lt;br&gt;
Without SPF, anyone could send an email claiming to be from your domain. Receiving servers know this, which is why they check for it.&lt;br&gt;
Here is how to add it:&lt;/p&gt;

&lt;p&gt;Go to Route 53 in the AWS Console.&lt;br&gt;
Click "Hosted zones" and open your domain.&lt;br&gt;
Click "Create record".&lt;br&gt;
Set the record type to "TXT".&lt;br&gt;
Leave the record name empty (or use @ if required).&lt;br&gt;
In the value field, paste this exactly:&lt;/p&gt;

&lt;p&gt;"v=spf1 include:amazonses.com ~all"&lt;/p&gt;

&lt;p&gt;Click "Create records".&lt;/p&gt;

&lt;p&gt;What this record says: emails from this domain are allowed to come from Amazon SES servers. The ~all at the end means "treat anything else with suspicion but do not block it outright." This is the safe starting point.&lt;/p&gt;

&lt;p&gt;Step 5: Set Up DMARC&lt;br&gt;
DMARC stands for Domain-based Message Authentication, Reporting and Conformance. It is the policy that ties SPF and DKIM together.&lt;br&gt;
DMARC tells receiving servers: "Here is what to do if my emails fail the SPF or DKIM check." Without DMARC, servers make their own decisions, and those decisions often mean spam folder.&lt;br&gt;
Here is how to add it:&lt;/p&gt;

&lt;p&gt;In Route 53, go to your hosted zone again.&lt;br&gt;
Create another TXT record.&lt;br&gt;
Set the record name to _dmarc (Route 53 will automatically append your domain, making it _dmarc.yourdomain.com).&lt;br&gt;
In the value field, paste this:&lt;/p&gt;

&lt;p&gt;"v=DMARC1; p=quarantine; rua=mailto:&lt;a href="mailto:youremail@yourdomain.com"&gt;youremail@yourdomain.com&lt;/a&gt;"&lt;/p&gt;

&lt;p&gt;Replace the email address with one you actually check.&lt;br&gt;
Click "Create records".&lt;/p&gt;

&lt;p&gt;What each part means:&lt;/p&gt;

&lt;p&gt;v=DMARC1 — this is a DMARC record&lt;br&gt;
p=quarantine — if authentication fails, send the email to spam (safer than p=reject when you are just starting, which would block emails entirely)&lt;br&gt;
rua=mailto:... — where AWS should send weekly reports about your email activity&lt;/p&gt;

&lt;p&gt;Once you are confident your setup is working correctly, you can upgrade to p=reject to fully block unauthenticated emails.&lt;/p&gt;

&lt;p&gt;Step 6: Exit the SES Sandbox&lt;br&gt;
Every new AWS account starts in something called the SES sandbox. In sandbox mode, you can only send emails to addresses you have manually verified. This is a security measure AWS uses to prevent spam from new accounts.&lt;br&gt;
The problem is, your real users have not verified their emails with AWS. So if you are still in sandbox mode, your emails will fail silently.&lt;br&gt;
To exit the sandbox:&lt;/p&gt;

&lt;p&gt;Go to Amazon SES in the AWS Console.&lt;br&gt;
Click "Account dashboard" in the left sidebar.&lt;br&gt;
Under "Sending limits", you will see a message about sandbox mode. Click "Request production access".&lt;br&gt;
Fill in the short form. Select "Transactional" as the mail type (since you are sending verification and password reset emails, not marketing).&lt;br&gt;
Describe your use case clearly: something like "Sending user verification and password reset emails for a web application."&lt;br&gt;
Submit the request.&lt;/p&gt;

&lt;p&gt;AWS typically approves this within a few hours to one business day. You will get an email confirmation once approved.&lt;/p&gt;

&lt;p&gt;Step 7: Connect Cognito to SES&lt;br&gt;
Now that SES is properly configured, you need to tell Cognito to use it instead of its default email system.&lt;/p&gt;

&lt;p&gt;Go to the AWS Console and open "Amazon Cognito".&lt;br&gt;
Click on your User Pool.&lt;br&gt;
Go to the "Messaging" tab.&lt;br&gt;
Under "Email", click "Edit".&lt;br&gt;
Change the "Email provider" from "Send email with Cognito" to "Send email with Amazon SES".&lt;br&gt;
Under "SES Region", choose the same region where you set up your SES identity.&lt;br&gt;
Under "FROM email address", enter &lt;a href="mailto:no-reply@yourdomain.com"&gt;no-reply@yourdomain.com&lt;/a&gt; (or whatever address you want to send from, as long as the domain is verified in SES).&lt;br&gt;
Optionally, set a "FROM sender name" like "MyApp Support". This is what appears as the sender name in the user's inbox.&lt;br&gt;
Save the changes.&lt;/p&gt;

&lt;p&gt;From this point on, all Cognito emails — verifications and password resets — will go through your verified SES identity with proper authentication.&lt;/p&gt;

&lt;p&gt;Step 8: Customize Your Email Templates&lt;br&gt;
This step is optional but strongly recommended, especially for beginner projects. Cognito's default email messages are very generic, and a branded email builds trust with users (and also looks less like spam to mail filters).&lt;br&gt;
In the same "Messaging" section of your Cognito User Pool:&lt;/p&gt;

&lt;p&gt;Click on "Message templates".&lt;br&gt;
You will see options for "Verification message" and "Password reset message".&lt;br&gt;
Click edit on each one.&lt;br&gt;
You can write a plain text or HTML message. Here is a simple example for the verification email:&lt;/p&gt;

&lt;p&gt;Subject: Verify your email for MyApp&lt;/p&gt;

&lt;p&gt;Hi,&lt;/p&gt;

&lt;p&gt;Thank you for signing up. Please verify your email address by entering the code below in the app:&lt;/p&gt;

&lt;p&gt;Your verification code: {####}&lt;/p&gt;

&lt;p&gt;If you did not sign up for MyApp, you can ignore this email.&lt;/p&gt;

&lt;p&gt;Regards,&lt;br&gt;
The MyApp Team&lt;br&gt;
The {####} placeholder is automatically replaced by Cognito with the actual verification code or link.&lt;br&gt;
Keep the message clear, short, and professional. Avoid using words like "free", "click here", or excessive capitalization, as these can trigger spam filters even when authentication is correct.&lt;/p&gt;

&lt;p&gt;How to Confirm Everything Is Working&lt;br&gt;
After setting everything up, use a free tool called MXToolbox to verify your DNS records:&lt;/p&gt;

&lt;p&gt;Go to MXToolbox and run an "SPF Lookup" for your domain. You should see the SES include statement in the result.&lt;br&gt;
Run a "DMARC Lookup" for your domain. You should see your DMARC policy.&lt;br&gt;
For DKIM, you can run a "DKIM Lookup" using the selector that SES provided.&lt;/p&gt;

&lt;p&gt;To test the full email delivery, use Mail Tester. It gives you a temporary email address. Trigger a verification email from your Cognito signup flow to that address, then check your score. A score of 8 or higher means your setup is solid.&lt;/p&gt;

&lt;p&gt;Quick Checklist Before You Go Live&lt;br&gt;
Before launching your app to real users, confirm the following:&lt;/p&gt;

&lt;p&gt;Domain is verified in Amazon SES&lt;br&gt;
DKIM records (3 CNAMEs) are added and verified&lt;br&gt;
SPF TXT record is added to your domain&lt;br&gt;
DMARC TXT record is added to _dmarc.yourdomain.com&lt;br&gt;
SES sandbox mode has been exited (production access approved)&lt;br&gt;
Cognito is configured to use SES as the email provider&lt;br&gt;
Custom email templates are set up with a clear sender name and message&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
Email deliverability is one of those things that most developers only think about after something breaks. Verification emails going to spam, users not completing sign-up, support tickets about missing password reset emails — these are all symptoms of the same root cause: an unauthenticated domain.&lt;br&gt;
The good news is that fixing it is straightforward. SPF, DKIM, and DMARC are one-time DNS configurations. Connecting Cognito to SES takes less than ten minutes. And once it is done, your emails will reliably reach inboxes.&lt;br&gt;
If you are building something on AWS and handling user authentication, getting this right early will save you a lot of headaches later.&lt;/p&gt;

&lt;p&gt;Need Help?&lt;br&gt;
If you run into any issues with the setup — whether it is a DNS record that does not verify, SES sandbox approval, or connecting things in Cognito — feel free to reach out. I am happy to walk you through it.&lt;br&gt;
Email me at &lt;a href="mailto:khantanseer43@gmail.com"&gt;khantanseer43@gmail.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>serverless</category>
    </item>
    <item>
      <title>Hey everyone! Just published a blog on a problem I ran into recently.
If you are using AWS Cognito for auth and your verification or password reset emails are going to spam, this one is for you.</title>
      <dc:creator>Tanseer</dc:creator>
      <pubDate>Tue, 28 Apr 2026 04:50:04 +0000</pubDate>
      <link>https://forem.com/tanseer/hey-everyone-just-published-a-blog-on-a-problem-i-ran-into-recently-if-you-are-using-aws-cognito-1512</link>
      <guid>https://forem.com/tanseer/hey-everyone-just-published-a-blog-on-a-problem-i-ran-into-recently-if-you-are-using-aws-cognito-1512</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989" class="crayons-story__hidden-navigation-link"&gt;Your AWS Cognito Emails Are Going to Spam — Here Is How to Fix It Step by Step&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/tanseer" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3901526%2Faae5933f-439d-4185-ad46-10b5e922d96c.jpg" alt="tanseer profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/tanseer" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Tanseer
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Tanseer
                
              
              &lt;div id="story-author-preview-content-3560107" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/tanseer" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3901526%2Faae5933f-439d-4185-ad46-10b5e922d96c.jpg" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Tanseer&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 28&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989" id="article-link-3560107"&gt;
          Your AWS Cognito Emails Are Going to Spam — Here Is How to Fix It Step by Step
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/aws"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;aws&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/serverless"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;serverless&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;1&lt;span class="hidden s:inline"&gt; reaction&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            8 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
    </item>
    <item>
      <title>Your AWS Cognito Emails Are Going to Spam — Here Is How to Fix It Step by Step</title>
      <dc:creator>Tanseer</dc:creator>
      <pubDate>Tue, 28 Apr 2026 04:31:04 +0000</pubDate>
      <link>https://forem.com/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989</link>
      <guid>https://forem.com/tanseer/your-aws-cognito-emails-are-going-to-spam-here-is-how-to-fix-it-step-by-step-4989</guid>
      <description>&lt;h3&gt;
  
  
  A beginner-friendly guide to setting up SPF, DKIM, DMARC, Amazon SES, and custom email templates so your emails actually reach the inbox
&lt;/h3&gt;

&lt;h2&gt;
  
  
  Who This Guide Is For
&lt;/h2&gt;

&lt;p&gt;If you are building an app on AWS and using Cognito to handle user sign-up and login, you have probably noticed that Cognito sends emails automatically — a verification email when someone signs up, and a password reset email when they forget their password.&lt;/p&gt;

&lt;p&gt;But if those emails are landing in spam, or not arriving at all, this guide is for you.&lt;/p&gt;

&lt;p&gt;We are going to fix that problem from scratch. No prior knowledge of email infrastructure is assumed. Every term will be explained.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Is the Problem, Exactly?
&lt;/h2&gt;

&lt;p&gt;When your app sends an email from something like &lt;code&gt;no-reply@yourdomain.com&lt;/code&gt;, the email does not go directly from your laptop to the user's inbox. It travels through mail servers, and along the way, the receiving server (Gmail, Outlook, etc.) checks a simple question:&lt;/p&gt;

&lt;p&gt;"Can I trust that this email actually came from this domain?"&lt;/p&gt;

&lt;p&gt;If the answer is unclear or no, the email gets flagged as spam — or silently dropped.&lt;/p&gt;

&lt;p&gt;To answer that question, three things need to be in place on your domain: SPF, DKIM, and DMARC. These are DNS records (small pieces of configuration stored on your domain) that prove your emails are legitimate.&lt;/p&gt;

&lt;p&gt;We will set all of them up in this guide.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Stack We Are Working With
&lt;/h2&gt;

&lt;p&gt;Here is what this guide assumes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You have an AWS account&lt;/li&gt;
&lt;li&gt;You have a Cognito User Pool set up (or are planning to set one up)&lt;/li&gt;
&lt;li&gt;Your domain is managed in Route 53 (AWS's DNS service)&lt;/li&gt;
&lt;li&gt;You want Cognito to send emails from your custom domain, like &lt;code&gt;no-reply@yourdomain.com&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If your domain is with GoDaddy, Namecheap, or another provider, the DNS steps will look slightly different in their interface, but the records you need to add are identical.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 1: Understand What Amazon SES Is
&lt;/h2&gt;

&lt;p&gt;Before we do anything, let us understand a key service: Amazon SES.&lt;/p&gt;

&lt;p&gt;SES stands for Simple Email Service. It is AWS's service for sending emails. By default, Cognito uses its own basic email system, which has very low sending limits and no support for custom domains. That is why emails look generic and often end up in spam.&lt;/p&gt;

&lt;p&gt;The fix is to connect Cognito to SES, and configure SES properly with your domain. SES is free for low volumes, and the setup is a one-time thing.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 2: Verify Your Domain in Amazon SES
&lt;/h2&gt;

&lt;p&gt;Before SES can send emails on behalf of your domain, it needs to confirm that you actually own it. This is called domain verification.&lt;/p&gt;

&lt;p&gt;Here is how to do it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Log in to the AWS Console and search for "Amazon SES" in the top search bar.&lt;/li&gt;
&lt;li&gt;In the left sidebar, click "Verified identities".&lt;/li&gt;
&lt;li&gt;Click "Create identity".&lt;/li&gt;
&lt;li&gt;Choose "Domain" and type your domain name (for example, &lt;code&gt;mydomain.com&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;If your domain is in Route 53, check the option that says "Use Route 53 to publish DNS records automatically." AWS will handle the DNS setup for you.&lt;/li&gt;
&lt;li&gt;Click "Create identity".&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If you are not using Route 53, SES will show you a CNAME record that you need to manually add in your DNS provider's dashboard. Copy it exactly as shown and add it there.&lt;/p&gt;

&lt;p&gt;Once AWS detects the record, the status will change to "Verified". This can take anywhere from a few minutes to a couple of hours.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 3: Set Up DKIM
&lt;/h2&gt;

&lt;p&gt;DKIM stands for DomainKeys Identified Mail. Think of it like a wax seal on a letter — it proves the email came from you and was not tampered with in transit.&lt;/p&gt;

&lt;p&gt;Every email sent through SES gets a digital signature. The receiving server checks that signature against a public key stored in your DNS. If they match, the email is trusted.&lt;/p&gt;

&lt;p&gt;When you verified your domain in the previous step, SES automatically generated DKIM keys for you. You just need to add the DNS records.&lt;/p&gt;

&lt;p&gt;SES will show you three CNAME records under the "DKIM signatures" section of your verified identity. If you used Route 53 automatic publishing, these are already added. If not, copy all three and add them as CNAME records in your DNS provider.&lt;/p&gt;

&lt;p&gt;Once AWS confirms the records are live, DKIM status will show "Verified."&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 4: Set Up SPF
&lt;/h2&gt;

&lt;p&gt;SPF stands for Sender Policy Framework. It is a DNS record that tells the world which servers are allowed to send email from your domain.&lt;/p&gt;

&lt;p&gt;Without SPF, anyone could send an email claiming to be from your domain. Receiving servers know this, which is why they check for it.&lt;/p&gt;

&lt;p&gt;Here is how to add it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Route 53 in the AWS Console.&lt;/li&gt;
&lt;li&gt;Click "Hosted zones" and open your domain.&lt;/li&gt;
&lt;li&gt;Click "Create record".&lt;/li&gt;
&lt;li&gt;Set the record type to "TXT".&lt;/li&gt;
&lt;li&gt;Leave the record name empty (or use &lt;code&gt;@&lt;/code&gt; if required).&lt;/li&gt;
&lt;li&gt;In the value field, paste this exactly:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"v=spf1 include:amazonses.com ~all"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Click "Create records".&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What this record says: emails from this domain are allowed to come from Amazon SES servers. The &lt;code&gt;~all&lt;/code&gt; at the end means "treat anything else with suspicion but do not block it outright." This is the safe starting point.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 5: Set Up DMARC
&lt;/h2&gt;

&lt;p&gt;DMARC stands for Domain-based Message Authentication, Reporting and Conformance. It is the policy that ties SPF and DKIM together.&lt;/p&gt;

&lt;p&gt;DMARC tells receiving servers: "Here is what to do if my emails fail the SPF or DKIM check." Without DMARC, servers make their own decisions, and those decisions often mean spam folder.&lt;/p&gt;

&lt;p&gt;Here is how to add it:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In Route 53, go to your hosted zone again.&lt;/li&gt;
&lt;li&gt;Create another TXT record.&lt;/li&gt;
&lt;li&gt;Set the record name to &lt;code&gt;_dmarc&lt;/code&gt; (Route 53 will automatically append your domain, making it &lt;code&gt;_dmarc.yourdomain.com&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;In the value field, paste this:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"v=DMARC1; p=quarantine; rua=mailto:youremail@yourdomain.com"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;ol&gt;
&lt;li&gt;Replace the email address with one you actually check.&lt;/li&gt;
&lt;li&gt;Click "Create records".&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;What each part means:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;v=DMARC1&lt;/code&gt; — this is a DMARC record&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;p=quarantine&lt;/code&gt; — if authentication fails, send the email to spam (safer than &lt;code&gt;p=reject&lt;/code&gt; when you are just starting, which would block emails entirely)&lt;/li&gt;
&lt;li&gt;
&lt;code&gt;rua=mailto:...&lt;/code&gt; — where AWS should send weekly reports about your email activity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Once you are confident your setup is working correctly, you can upgrade to &lt;code&gt;p=reject&lt;/code&gt; to fully block unauthenticated emails.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 6: Exit the SES Sandbox
&lt;/h2&gt;

&lt;p&gt;Every new AWS account starts in something called the SES sandbox. In sandbox mode, you can only send emails to addresses you have manually verified. This is a security measure AWS uses to prevent spam from new accounts.&lt;/p&gt;

&lt;p&gt;The problem is, your real users have not verified their emails with AWS. So if you are still in sandbox mode, your emails will fail silently.&lt;/p&gt;

&lt;p&gt;To exit the sandbox:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to Amazon SES in the AWS Console.&lt;/li&gt;
&lt;li&gt;Click "Account dashboard" in the left sidebar.&lt;/li&gt;
&lt;li&gt;Under "Sending limits", you will see a message about sandbox mode. Click "Request production access".&lt;/li&gt;
&lt;li&gt;Fill in the short form. Select "Transactional" as the mail type (since you are sending verification and password reset emails, not marketing).&lt;/li&gt;
&lt;li&gt;Describe your use case clearly: something like "Sending user verification and password reset emails for a web application."&lt;/li&gt;
&lt;li&gt;Submit the request.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;AWS typically approves this within a few hours to one business day. You will get an email confirmation once approved.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 7: Connect Cognito to SES
&lt;/h2&gt;

&lt;p&gt;Now that SES is properly configured, you need to tell Cognito to use it instead of its default email system.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to the AWS Console and open "Amazon Cognito".&lt;/li&gt;
&lt;li&gt;Click on your User Pool.&lt;/li&gt;
&lt;li&gt;Go to the "Messaging" tab.&lt;/li&gt;
&lt;li&gt;Under "Email", click "Edit".&lt;/li&gt;
&lt;li&gt;Change the "Email provider" from "Send email with Cognito" to "Send email with Amazon SES".&lt;/li&gt;
&lt;li&gt;Under "SES Region", choose the same region where you set up your SES identity.&lt;/li&gt;
&lt;li&gt;Under "FROM email address", enter &lt;code&gt;no-reply@yourdomain.com&lt;/code&gt; (or whatever address you want to send from, as long as the domain is verified in SES).&lt;/li&gt;
&lt;li&gt;Optionally, set a "FROM sender name" like "MyApp Support". This is what appears as the sender name in the user's inbox.&lt;/li&gt;
&lt;li&gt;Save the changes.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;From this point on, all Cognito emails — verifications and password resets — will go through your verified SES identity with proper authentication.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 8: Customize Your Email Templates
&lt;/h2&gt;

&lt;p&gt;This step is optional but strongly recommended, especially for beginner projects. Cognito's default email messages are very generic, and a branded email builds trust with users (and also looks less like spam to mail filters).&lt;/p&gt;

&lt;p&gt;In the same "Messaging" section of your Cognito User Pool:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Click on "Message templates".&lt;/li&gt;
&lt;li&gt;You will see options for "Verification message" and "Password reset message".&lt;/li&gt;
&lt;li&gt;Click edit on each one.&lt;/li&gt;
&lt;li&gt;You can write a plain text or HTML message. Here is a simple example for the verification email:
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight email"&gt;&lt;code&gt;&lt;span class="nt"&gt;Subject&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;&lt;span class="na"&gt; Verify your email for MyApp&lt;/span&gt;

Hi,

Thank you for signing up. Please verify your email address by entering the code below in the app:

Your verification code: {####}

If you did not sign up for MyApp, you can ignore this email.

Regards,
The MyApp Team
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;{####}&lt;/code&gt; placeholder is automatically replaced by Cognito with the actual verification code or link.&lt;/p&gt;

&lt;p&gt;Keep the message clear, short, and professional. Avoid using words like "free", "click here", or excessive capitalization, as these can trigger spam filters even when authentication is correct.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to Confirm Everything Is Working
&lt;/h2&gt;

&lt;p&gt;After setting everything up, use a free tool called &lt;a href="https://mxtoolbox.com" rel="noopener noreferrer"&gt;MXToolbox&lt;/a&gt; to verify your DNS records:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Go to MXToolbox and run an "SPF Lookup" for your domain. You should see the SES include statement in the result.&lt;/li&gt;
&lt;li&gt;Run a "DMARC Lookup" for your domain. You should see your DMARC policy.&lt;/li&gt;
&lt;li&gt;For DKIM, you can run a "DKIM Lookup" using the selector that SES provided.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To test the full email delivery, use &lt;a href="https://www.mail-tester.com" rel="noopener noreferrer"&gt;Mail Tester&lt;/a&gt;. It gives you a temporary email address. Trigger a verification email from your Cognito signup flow to that address, then check your score. A score of 8 or higher means your setup is solid.&lt;/p&gt;




&lt;h2&gt;
  
  
  Quick Checklist Before You Go Live
&lt;/h2&gt;

&lt;p&gt;Before launching your app to real users, confirm the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Domain is verified in Amazon SES&lt;/li&gt;
&lt;li&gt;DKIM records (3 CNAMEs) are added and verified&lt;/li&gt;
&lt;li&gt;SPF TXT record is added to your domain&lt;/li&gt;
&lt;li&gt;DMARC TXT record is added to &lt;code&gt;_dmarc.yourdomain.com&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;SES sandbox mode has been exited (production access approved)&lt;/li&gt;
&lt;li&gt;Cognito is configured to use SES as the email provider&lt;/li&gt;
&lt;li&gt;Custom email templates are set up with a clear sender name and message&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Email deliverability is one of those things that most developers only think about after something breaks. Verification emails going to spam, users not completing sign-up, support tickets about missing password reset emails — these are all symptoms of the same root cause: an unauthenticated domain.&lt;/p&gt;

&lt;p&gt;The good news is that fixing it is straightforward. SPF, DKIM, and DMARC are one-time DNS configurations. Connecting Cognito to SES takes less than ten minutes. And once it is done, your emails will reliably reach inboxes.&lt;/p&gt;

&lt;p&gt;If you are building something on AWS and handling user authentication, getting this right early will save you a lot of headaches later.&lt;/p&gt;




&lt;h2&gt;
  
  
  Need Help?
&lt;/h2&gt;

&lt;p&gt;If you run into any issues with the setup — whether it is a DNS record that does not verify, SES sandbox approval, or connecting things in Cognito — feel free to reach out. I am happy to walk you through it.&lt;/p&gt;

&lt;p&gt;Email me at &lt;strong&gt;&lt;a href="mailto:khantanseer43@gmail.com"&gt;khantanseer43@gmail.com&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;




&lt;h1&gt;
  
  
  AWS #AmazonSES #Cognito #EmailDeliverability #SPF #DKIM #DMARC #Route53 #Serverless #AWSCommunity #CloudComputing #BackendDevelopment #AWSBuilder #EmailAuthentication #LearnAWS #WebDevelopment
&lt;/h1&gt;

</description>
      <category>aws</category>
      <category>serverless</category>
    </item>
  </channel>
</rss>
