authhero
v5.7.0
Published
Authhero is an open-source authentication library designed as a drop-in replacement for Auth0. It provides a fully functional auth server that you can set up in minutes.
Downloads
5,567
Readme
Authhero
Authhero is an open-source authentication library designed as a drop-in replacement for Auth0. It provides a fully functional auth server that you can set up in minutes.
Getting Started
Set up a new project with Authhero in 5 minutes or less:
npx create authheroAlternatively, you can install the npm packages into an existing project and integrate Authhero with your existing setup.
Installation
Authhero consists of several npm packages that provide different authentication-related functionalities. The package includes four Hono routers, each handling a different aspect of the auth server:
- Management API (
management-api): Exposes endpoints for managing authentication data, compatible with Auth0's/api/v2. - Auth API (
auth-api): Implements OAuth2/OIDC endpoints for user authentication. - Universal Auth (
universal-auth): Provides a server-side rendered UI for login. - SAML App (
saml-app): Handles SAML authentication endpoints.
Creating a New Auth Server
To initialize an auth server using Authhero:
const { managementApp, oauthApp, universalApp, samlApp } = init({
dataAdapter: params.dataAdapter,
});
rootApp
.route("/", oauthApp)
.route("/u", universalApp)
.route("/api/v2", managementApp)
.route("/", samlApp);Data Adapters
Authhero uses data adapters to handle persistence. The default adapter is @authhero/kysely, which connects to any SQL database using Kysely. Future versions will migrate to Drizzle as the default data adapter. You can also create custom adapters, such as DynamoDB + Elasticsearch.
Hooks
Authhero supports hooks to customize authentication logic. For example, you can grant roles dynamically using the onExecuteCredentialsExchange hook:
hooks: {
onExecuteCredentialsExchange: async (
event: OnExecuteCredentialsExchangeEvent,
api: OnExecuteCredentialsExchangeAPI,
) => {
if (event.client.client_id === "sampleClient") {
api.accessToken.setCustomClaim("roles", "admin");
}
}
},Supported Hooks
onExecuteCredentialsExchangeonExecutePreUserRegistrationonExecutePostUserRegistrationonExecutePostLogin
Development
Building
The package uses a multi-step build process that must be run in sequence:
pnpm buildThis runs the following steps in order:
- Clean the
distdirectory - Build Tailwind CSS styles
- Build ShadCN UI styles
- Build client-side JavaScript
- Compile TypeScript
- Build server-side bundle with Vite
- Generate TypeScript declaration files
- Copy static assets
Important: Always use pnpm build rather than running individual build commands or vite build directly. The build steps are interdependent and use emptyOutDir: false to preserve files built in previous steps. Running commands individually or out of order may result in incomplete or stale artifacts.
To clean build artifacts manually:
pnpm cleanEmail and SMS Service Adapters
Authhero supports email and SMS service adapters for sending authentication-related emails and codes. Provide them as part of your DataAdapters:
import { EmailServiceAdapter, SmsServiceAdapter } from "@authhero/adapter-interfaces";
const dataAdapter = {
...createAdapters(db),
emailService: myEmailAdapter,
smsService: mySmsAdapter,
};
const { app } = init({ dataAdapter });Outbox relay in cron
Authhero uses a transactional outbox to deliver audit events and webhook dispatches. Events are delivered per-request by default, but you should also sweep the outbox on a schedule as a safety net for events that failed in-request delivery (e.g. a transient webhook 5xx).
Use runOutboxRelay as the entire body of your scheduled handler — it
builds the same destination array the inline dispatcher uses, mints
per-tenant auth-service tokens via the same in-process path, runs
drainOutbox, and then cleanupOutbox:
import { runOutboxRelay } from "authhero";
// Cloudflare Workers scheduled handler (one per cron trigger)
export default {
async scheduled(_event, env) {
await runOutboxRelay({
dataAdapter,
issuer: env.ISSUER,
webhookInvoker, // same function passed to init()
retentionDays: 7,
});
},
};Passing the same webhookInvoker you pass to init() is important: without
it, cron-drained hook.* events would bypass any custom payload shaping,
auth headers, or non-HTTP transports your invoker implements, and diverge
silently from per-request deliveries.
Lower-level escape hatches
If you need something custom, drainOutbox, cleanupOutbox, and
createDefaultDestinations are also exported. createDefaultDestinations
accepts the same optional webhookInvoker so you can wire up invoker
parity without the full one-call wrapper. The underlying destination
classes (LogsDestination, WebhookDestination,
RegistrationFinalizerDestination) and the EventDestination interface
are also public.
Contributing
Contributions are welcome! Feel free to open issues and submit pull requests to improve Authhero.
License
Authhero is open-source and available under the MIT License.
Using Tailwind CSS with authhero components
There are two ways to use the Tailwind CSS styles with authhero components:
1. Import the CSS file (for environments with filesystem access)
// Import the CSS
import "authhero/styles";
// Then use the components
import { Button, Form } from "authhero";2. Inject CSS programmatically (for Cloudflare Workers and similar environments)
For environments that don't support filesystem access, you can inject the CSS programmatically:
// Import the helper function
import { injectTailwindCSS } from "authhero";
// Call this function once to inject the CSS into the document
injectTailwindCSS();
// Then use the components
import { Button, Form } from "authhero";You can also access the raw CSS string:
import { tailwindCss } from "authhero";
// Use the CSS string as needed
// For example, in a Cloudflare Worker:
const html = `
<!DOCTYPE html>
<html>
<head>
<style>${tailwindCss}</style>
</head>
<body>
<!-- Your content -->
</body>
</html>
`;