mikroauth
v1.1.0
Published
Dead-simple magic link authentication that is useful, lightweight, and uncluttered.
Maintainers
Readme
MikroAuth
Dead-simple magic link authentication that is useful, lightweight, and uncluttered.
- Ever wanted to have your own Firebase Auth-like magic link authentication? Look no further, this is it!
- Secure magic link (email) login solution using JWTs
- Customizable text and HTML email templates
- Can be used as a library or exposed directly as an API
- Can be used with in-memory providers for storage and email or with providers for PikoDB and MikroMail
- Just ~8kb gzipped, using only four (max) lightweight dependencies:
- MikroConf for handling config options;
- PikoDB and MikroMail for sending emails and persisting data;
- MikroServe when exposing MikroAuth as an API.
- Application-layer encryption using AES-256-GCM (zero dependencies)
- High test coverage
Ecosystem
- MikroAuth client library
- MikroAuth example (requires MikroAuth running)
Installation
npm install mikroauth -SUsage
Quick Start
import { MikroAuth } from 'mikroauth';
(async () => {
// Uses in-memory providers by default if none are explicitly passed into MikroAuth
const auth = new MikroAuth({
appUrl: 'https://acmecorp.xyz/app',
jwtSecret: 'your-secret-signing-key-for-jwts'
});
await auth.createMagicLink({
email: '[email protected]',
// Optional: override subject, appUrl, or add metadata
// subject: 'Welcome to ACME Corp',
// appUrl: 'https://custom.acmecorp.xyz/login',
// metadata: { userName: 'Sam' }
});
// Close manually since there is a persistent event loop started by MikroAuth
process.exit(0);
})();Example: Using Real Providers
import { MikroAuth, PikoDBProvider, MikroMailProvider } from 'mikroauth';
import { PikoDB } from 'pikodb';
(async () => {
// Using MikroMail to send emails
const email = new MikroMailProvider({
user: '[email protected]',
password: 'YOUR_PASSWORD_HERE',
host: 'smtp.email-provider.com'
});
// Create a PikoDB provider with optional encryption
const storage = new PikoDBProvider(
new PikoDB({ databaseDirectory: 'mikroauth' }),
process.env.STORAGE_KEY // Optional encryption key
);
await storage.start();
// Initializing MikroAuth with our providers
const auth = new MikroAuth(
{
appUrl: 'https://acmecorp.xyz/app',
jwtSecret: 'your-secret-signing-key-for-jwts',
// Additional options you can set
magicLinkExpirySeconds: 15 * 60,
jwtExpirySeconds: 60 * 60,
refreshTokenExpirySeconds: 7 * 24 * 60 * 60,
maxActiveSessions: 3,
templates: null,
debug: false
},
email,
storage
);
await auth.createMagicLink({
email: '[email protected]'
});
// Close manually since there is a persistent event loop started by MikroAuth
process.exit(0);
})();Example: Return credentials/tokens at once (no email)
import { MikroAuth } from 'mikroauth';
const mikroAuth = new MikroAuth({
auth: { jwtSecret: 'your-secret' },
email: { user: '[email protected]' }
});
// Programmatic token creation (e.g., for SSO)
const tokens = await mikroAuth.createToken({
email: '[email protected]',
username: 'john_doe',
role: 'admin',
ip: '192.168.1.1' // optional
});
// Returns:
// {
// accessToken: 'eyJhbGc...',
// refreshToken: 'abc123...',
// exp: 3600,
// tokenType: 'Bearer'
// }How Magic Links Work
Magic links are a simple, yet powerful, passwordless authentication flow that works by sending a secure login link directly to the user's email. It's as simple as:
┌────────┐ ┌────────┐
│ User │ │ Server │
└───┬────┘ └───┬────┘
│ │
│ 1. Enter email address │
│ ───────────────────────────────────────────► X
│ │
│ │ 2. Generate unique token
│ │ Store token with email
│ │
│ 3. Send email with magic link │
X ◄─────────────────────────────────────────── │
│ │
│ 4. Click magic link │
│ ───────────────────────────────────────────► X
│ │
│ │ 5. Validate token
│ │ Create session
│ │
│ 6. Return JWT + refresh token │
X ◄─────────────────────────────────────────── │
│ │When a users request access, they provide only their email address. MikroAuth generates a cryptographically secure token (using SHA-256 with email, timestamp, and random data), stores it with an expiration time, and emails a link containing this token to the user.
Then, when the user clicks the link, MikroAuth validates the token, creates a session (JWT for authentication and a refresh token for maintaining the session), and logs them in securely - all without requiring a password.
MikroAuth also includes safeguards against abuse by invalidating existing magic links when new ones are requested, enforcing link expiration times, preventing token reuse, and managing multiple sessions for the same user.
Configuration
Settings can be provided in multiple ways.
- They can be provided via the CLI, e.g.
node app.js --port 1234. - Certain values can be provided via environment variables.
- Port:
process.env.PORT- number - Host:
process.env.HOST- string - Debug:
process.env.DEBUG- boolean
- Port:
- Programmatically/directly via scripting, e.g.
new MikroAuth({ port: 1234 }). - They can be placed in a configuration file named
mikroauth.config.json(plain JSON), which will be automatically applied on load.
Options
| CLI argument | CLI value | JSON (config file) value | Environment variable |
|-----------------------------|---------------------------------------------------------------|------------------------------------|----------------------|
| --jwtSecret | <string> | auth.jwtSecret | AUTH_JWT_SECRET |
| --magicLinkExpirySeconds | <number> | auth.magicLinkExpirySeconds | |
| --jwtExpirySeconds | <number> | auth.jwtExpirySeconds | |
| --refreshTokenExpirySeconds | <number> | auth.refreshTokenExpirySeconds | |
| --maxActiveSessions | <number> | auth.maxActiveSessions | |
| | | auth.templates | |
| --appUrl | <string> | auth.appUrl | APP_URL |
| --debug | none (is flag) | auth.debug | DEBUG |
| --emailSubject | <string> | email.emailSubject | |
| --emailHost | <string> | email.user | EMAIL_USER |
| --emailUser | <string> | email.host | EMAIL_HOST |
| --emailPassword | <string> | email.password | EMAIL_PASSWORD |
| --emailPort | <number> | email.port | |
| --emailSecure | none (is flag) | email.secure | |
| --emailMaxRetries | <number> | email.maxRetries | |
| --debug | none (is flag) | email.debug | DEBUG |
| --dir | <string> | storage.databaseDirectory | |
| --encryptionKey | <string> | storage.encryptionKey | STORAGE_KEY |
| --debug | none (is flag) | storage.debug | DEBUG |
| --port | <number> | server.port | PORT |
| --host | <string> | server.host | HOST |
| --https | none (is flag) | server.useHttps | |
| --http2 | none (is flag) | server.useHttp2 | |
| --cert | <string> | server.sslCert | |
| --key | <string> | server.sslKey | |
| --ca | <string> | server.sslCa | |
| --ratelimit | none (is flag) | server.rateLimit.enabled | |
| --rps | <number> | server.rateLimit.requestsPerMinute | |
| --allowed | <comma-separated strings> (array of strings in JSON config) | server.allowedDomains | |
| --debug | none (is flag) | server.debug | DEBUG |
Setting debug mode in CLI arguments will enable debug mode across all areas. To granularly define this, use a config file.
Order of Application
As per MikroConf behavior, the configuration sources are applied in this order:
- Command line arguments (highest priority)
- Programmatically provided config
- Config file (JSON)
- Default values (lowest priority)
Magic Link Configuration
Defaults shown and explained.
{
// The base URL to use in the magic link, before appending "?token=TOKEN_VALUE&email=EMAIL_ADDRESS"
appUrl: 'https://acmecorp.xyz/app',
// Your secret JWT signing key
jwtSecret: 'your-secret-signing-key-for-jwts',
// Time until magic link expires (15 min)
magicLinkExpirySeconds: 15 * 60,
// Time until JWT expires (60 minutes)
jwtExpirySeconds: 60 * 60,
// Time until refresh token expires (7 days)
refreshTokenExpirySeconds: 7 * 24 * 60 * 60,
// How many active sessions can a user have?
maxActiveSessions: 3,
// Custom email templates to use
templates: null,
// Use debug mode?
debug: false
}Templates are passed in as an object with a function each to create the text and HTML versions of the magic link email.
{
// ...
templates: {
textVersion: (magicLink: string, expiryMinutes: number) =>
`Sign in to your service. Go to ${magicLink} — the link expires in ${expiryMinutes} minutes.`,
htmlVersion: (magicLink: string, expiryMinutes: number) =>
`<h1>Sign in to your service</h1><p>Go to ${magicLink} — the link expires in ${expiryMinutes} minutes.</p>`
}
}Using Metadata in Templates
Templates can optionally accept a metadata parameter that allows you to dynamically customize email content. This is useful for personalization, conditional content, and context-specific messaging.
{
// ...
templates: {
textVersion: (magicLink: string, expiryMinutes: number, metadata?: Record<string, any>) => {
const userName = metadata?.userName || 'User';
const greeting = metadata?.isNewUser
? `Welcome to our platform, ${userName}!`
: `Welcome back, ${userName}!`;
return `${greeting}\n\nClick here to login: ${magicLink}\nThis link expires in ${expiryMinutes} minutes.`;
},
htmlVersion: (magicLink: string, expiryMinutes: number, metadata?: Record<string, any>) => {
const userName = metadata?.userName || 'User';
const greeting = metadata?.isNewUser
? `Welcome to our platform, ${userName}!`
: `Welcome back, ${userName}!`;
return `
<h1>${greeting}</h1>
<p><a href="${magicLink}">Click here to login</a></p>
<p>This link expires in ${expiryMinutes} minutes.</p>
`;
}
}
}To pass metadata when creating a magic link:
await auth.createMagicLink({
email: '[email protected]',
metadata: {
userName: 'Sam Person',
isNewUser: false,
companyName: 'ACME Corp',
lastLogin: '2025-01-15'
}
});You can use metadata for various use cases:
- Personalization: Include user names, company names, or other personal details
- Conditional content: Show different messages for new vs. returning users
- Contextual information: Display recent activity, account status, or special offers
- Localization: Customize content based on user language preferences
- Dynamic data: Include arrays, objects, or any structured data you need
Overriding App URL Per Magic Link
You can override the appUrl on a per-magic link basis, which is useful when serving multiple applications from a single authentication portal. This allows you to dynamically specify which application the user should be redirected to after clicking the magic link.
await auth.createMagicLink({
email: '[email protected]',
appUrl: 'https://app1.example.com/auth/callback'
});
// Different user, different application
await auth.createMagicLink({
email: '[email protected]',
appUrl: 'https://admin-portal.example.com/login'
});The appUrl override works alongside metadata, so you can customize both the destination URL and email content:
await auth.createMagicLink({
email: '[email protected]',
appUrl: 'https://custom-app.example.com',
metadata: {
userName: 'John Doe',
applicationName: 'Custom App'
}
});Common use cases for appUrl overrides:
- Multi-tenant applications: Direct users to their specific tenant/organization subdomain
- Authentication portal: Single MikroAuth instance serving multiple applications
- Environment-specific redirects: Send users to staging vs. production based on context
- Role-based routing: Direct admins to admin portal, users to user portal
- Deep linking: Send users to specific pages within your application
The overridden appUrl must be a valid URL format, otherwise the magic link creation will fail. If no override is provided, the default appUrl from configuration is used.
Overriding Email Subject Per Magic Link
You can override the email subject on a per-magic link basis, which is useful when you want to customize the email subject for different contexts, applications, or user types.
await auth.createMagicLink({
email: '[email protected]',
subject: 'Welcome to ACME Corp Portal'
});
// Different user, different subject
await auth.createMagicLink({
email: '[email protected]',
subject: 'Admin Portal Login Link'
});The subject override works alongside appUrl and metadata, so you can customize the email subject, destination URL, and content all at once:
await auth.createMagicLink({
email: '[email protected]',
subject: 'Sign in to Premium Dashboard',
appUrl: 'https://premium.example.com',
metadata: {
userName: 'John Doe',
tier: 'Premium'
}
});Common use cases for subject overrides:
- Multi-tenant applications: Customize subject lines with organization or tenant names
- Context-specific messaging: Different subjects for onboarding vs. returning users
- Application-specific branding: Match subject lines to different products or portals
- Localization: Provide subjects in different languages based on user preferences
- Priority or urgency indicators: Add context like "Urgent", "Action Required", etc.
- Event-driven authentication: Customize subjects for password resets, security alerts, etc.
If no override is provided, the default emailSubject from configuration is used.
Email Configuration
Defaults shown and explained.
{
// The subject line for the email
emailSubject: 'Your Secure Login Link',
// The user identity sending the email from your email provider
user: process.env.EMAIL_USER || '',
// The SMTP host of your email provider
host: process.env.EMAIL_HOST || '',
// The password for the user identity
password: process.env.EMAIL_PASSWORD || '',
// The port to use (465 is default for "secure")
port: 465,
// If true, sets port to 465
secure: true,
// How many deliveries will be attempted?
maxRetries: 2,
// Use debug mode?
debug: false
}See MikroMail for more details.
Server Mode
MikroAuth has built-in functionality to be exposed directly as a server or API using MikroServe.
Some nice features of running MikroAuth in server mode include:
- You get a zero-config-needed API for handling magic links
- JSON-based request and response format
- Configurable server options
- Support for both HTTP, HTTPS, and HTTP2
- Graceful shutdown handling
Starting the Server (Command Line)
npx mikroauthConfiguring the server (API) settings follows the conventions of MikroServe; please see that documentation for more details. In short, in this case, you can supply configuration in several ways:
- Configuration file, named
mikroauth.config.json - CLI arguments
- Environment variables
The only difference compared to regular MikroServe usage is that the server configuration object (if used) must be nested in a server object, and authentication settings in an auth object. For example, if you want to set the port value to 8080, your configuration would look like this:
{
"server": {
"port": 8080
},
"auth": {
"tokenExpiry": 3600,
"refreshTokenExpiry": 86400
}
}API Endpoints
Create Magic Link: Log In (Sign In)
POST /loginRequest body:
{
"email": "[email protected]"
}Response:
{
"message": "Some informational message"
}Verify Token
POST /verifyRequest body:
{
"email": "[email protected]"
}Headers:
Authorization: Bearer {token}Response:
{
"accessToken": "jwt-token",
"refreshToken": "refresh-token",
"expiresIn": 3600,
"tokenType": "Bearer"
}Refresh Access Token
POST /refreshRequest body:
{
"refreshToken": "refresh-token"
}Response:
{
"accessToken": "new-jwt-token",
"refreshToken": "new-refresh-token",
"expiresIn": 3600,
"tokenType": "Bearer"
}Get Sessions
GET /sessionsHeaders:
Authorization: Bearer {token}Response:
[
{
"id": "session-id",
"createdAt": "timestamp",
"lastLogin": "timestamp",
"lastUsed": "timestamp",
"metadata": {
"ip": "127.0.0.1"
},
"isCurrentSession": true/false
}
]Revoke Sessions
DELETE /sessionsHeaders:
Authorization: Bearer {token}Request body:
{
"refreshToken": "refresh-token"
}Response:
{
"message": "Some informational message"
}Log Out (Sign Out)
POST /logoutHeaders:
Authorization: Bearer {token}Request body:
{
"refreshToken": "refresh-token-to-invalidate"
}Response:
{
"message": "Some informational message"
}Error Handling
All endpoints return appropriate HTTP status codes:
200: Success401: Unauthorized (missing or invalid token)404: Not found or operation failed500: Internal server error
Providers
MikroAuth supports customizable providers for:
- Email delivery - for sending magic links
- Storage - for persisting tokens and sessions
By default, it uses in-memory providers suitable for development:
InMemoryEmailProviderInMemoryStorageProvider
You can implement your own providers by following the interfaces defined in the package.
Email Providers
MikroAuth includes built-in support for multiple email providers:
SMTP-Based Provider
MikroMailProvider - Uses SMTP for email delivery via MikroMail
import { MikroAuth, MikroMailProvider } from 'mikroauth';
const email = new MikroMailProvider({
user: '[email protected]',
password: 'YOUR_PASSWORD_HERE',
host: 'smtp.email-provider.com',
port: 465,
secure: true
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);API-Based Providers
All API-based providers use native fetch with zero dependencies:
ResendProvider - Modern transactional email API
import { MikroAuth, ResendProvider } from 'mikroauth';
const email = new ResendProvider({
apiKey: 're_your_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);BrevoProvider - Formerly Sendinblue, popular transactional email service
import { MikroAuth, BrevoProvider } from 'mikroauth';
const email = new BrevoProvider({
apiKey: 'your_brevo_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);PostmarkProvider - Reliable transactional email delivery
import { MikroAuth, PostmarkProvider } from 'mikroauth';
const email = new PostmarkProvider({
serverToken: 'your_postmark_server_token_here',
messageStream: 'outbound', // Optional, defaults to 'outbound'
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);SendGridProvider - Twilio SendGrid email API
import { MikroAuth, SendGridProvider } from 'mikroauth';
const email = new SendGridProvider({
apiKey: 'SG.your_sendgrid_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);AWSESProvider - Amazon Simple Email Service (SES) v2 API
import { MikroAuth, AWSESProvider } from 'mikroauth';
const email = new AWSESProvider({
accessKeyId: 'YOUR_AWS_ACCESS_KEY_ID',
secretAccessKey: 'YOUR_AWS_SECRET_ACCESS_KEY',
region: 'us-east-1', // Your AWS region
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);Notes:
- All API providers require verified sender addresses/domains per the provider's requirements
- API providers have no additional dependencies and use native Node.js
fetch - Error responses from the APIs are thrown as errors with
statusandresponseproperties
Server Configuration
HTTPS/HTTP2 Configuration
To enable HTTPS or HTTP2, provide the following options when starting the server:
const server = startServer({
useHttps: true,
// OR
useHttp2: true,
sslCert: '/path/to/certificate.pem',
sslKey: '/path/to/private-key.pem',
sslCa: '/path/to/ca-certificate.pem' // Optional
});Generating Self-Signed Certificates (for testing)
# Generate a private key
openssl genrsa -out private-key.pem 2048
# Generate a certificate signing request
openssl req -new -key private-key.pem -out csr.pem
# Generate a self-signed certificate (valid for 365 days)
openssl x509 -req -days 365 -in csr.pem -signkey private-key.pem -out certificate.pemFuture Ideas and Known Issues
- WebAuthn support?
- Emit events (emails?) for failed auth and such things?
- Add artificial delay to simulate waiting when trying to login as non-existent user?
License
MIT. See the LICENSE file.
