Initialization
Optionsβ
Options are passed to Auth.js when initializing it in a server environment like a Next.js API Route.
providersβ
- Default value:
[]
- Required: Yes
Descriptionβ
An array of authentication providers for signing in (e.g. Google, Facebook, Twitter, GitHub, Email, etc) in any order. This can be one of the built-in providers or an object with a custom provider.
Refer to the list of all available Oauth providers and the Oauth tutorial on how to use them.
secretβ
- Default value:
string
(SHA hash of the "options" object) in development, no default in production. - Required: Yes, in production!
Descriptionβ
A random string is used to hash tokens, sign/encrypt cookies and generate cryptographic keys.
If you set NEXTAUTH_SECRET
as an environment variable, you don't have to define this option.
If no value specified specified in development (and there is no NEXTAUTH_SECRET
variable either), it uses a hash for all configuration options, including OAuth Client ID / Secrets for entropy.
Not providing any secret
or NEXTAUTH_SECRET
will throw an error in production.
You can quickly create a good value on the command line via this openssl
command.
$ openssl rand -base64 32
If you rely on the default secret generation in development, you might notice JWT decryption errors, since the secret changes whenever you change your configuration. Defining an explicit secret will make this problem go away. We will likely make this option mandatory, even in development, in the future.
sessionβ
- Default value:
object
- Required: No
Descriptionβ
The session
object and all properties on it are optional.
Default values for this option are shown below:
session: {
// Choose how you want to save the user session.
// The default is `"jwt"`, an encrypted JWT (JWE) stored in the session cookie.
// If you use an `adapter` however, we default it to `"database"` instead.
// You can still force a JWT session by explicitly defining `"jwt"`.
// When using `"database"`, the session cookie will only contain a `sessionToken` value,
// which is used to look up the session in the database.
strategy: "database",
// Seconds - How long until an idle session expires and is no longer valid.
maxAge: 30 * 24 * 60 * 60, // 30 days
// Seconds - Throttle how frequently to write to database to extend a session.
// Use it to limit write operations. Set to 0 to always update the database.
// Note: This option is ignored if using JSON Web Tokens
updateAge: 24 * 60 * 60, // 24 hours
}
jwtβ
- Default value:
object
- Required: No
Descriptionβ
JSON Web Tokens can be used for session tokens if enabled with session: { strategy: "jwt" }
option. JSON Web Tokens are enabled by default if you have not specified an adapter. JSON Web Tokens are encrypted (JWE) by default. We recommend you keep this behaviour. See the Override JWT encode
and decode
methods advanced option.
JSON Web Token Optionsβ
jwt: {
// The maximum age of the Auth.js issued JWT in seconds.
// Defaults to `session.maxAge`.
maxAge: 60 * 60 * 24 * 30,
// You can define your own encode/decode functions for signing and encryption
async encode() {},
async decode() {},
}
An example JSON Web Token contains a payload like this:
{
name: 'Iain Collins',
email: 'me@iaincollins.com',
picture: 'https://example.com/image.jpg',
iat: 1594601838,
exp: 1597193838
}
JWT Helperβ
You can use the built-in getToken()
helper method to verify and decrypt the token, like this:
import { getToken } from "next-auth/jwt"
const secret = process.env.NEXTAUTH_SECRET
export default async function handler(req, res) {
// if using `NEXTAUTH_SECRET` env variable, we detect it, and you won't actually need to `secret`
// const token = await getToken({ req })
const token = await getToken({ req, secret })
console.log("JSON Web Token", token)
res.end()
}
For convenience, this helper function is also able to read and decode tokens passed from the Authorization: 'Bearer token'
HTTP header.
Required
The getToken() helper requires the following options:
req
- (object) Request objectsecret
- (string) JWT Secret. UseNEXTAUTH_SECRET
instead.
You must also pass any options configured on the jwt
option to the helper.
e.g. Including custom session maxAge
and custom signing and/or encryption keys or options
Optional
It also supports the following options:
secureCookie
- (boolean) Use secure prefixed cookie nameBy default, the helper function will attempt to determine if it should use the secure prefixed cookie (e.g.
true
in production andfalse
in development, unless NEXTAUTH_URL contains an HTTPS URL).cookieName
- (string) Session token cookie nameThe
secureCookie
option is ignored ifcookieName
is explicitly specified.raw
- (boolean) Get raw token (not decoded)If set to
true
returns the raw token without decrypting or verifying it.
The JWT is stored in the Session Token cookie, the same cookie used for tokens with database sessions.
pagesβ
- Default value:
{}
- Required: No
Descriptionβ
Specify URLs to be used if you want to create custom sign in, sign out and error pages.
Pages specified will override the corresponding built-in page.
For example:
pages: {
signIn: '/auth/signin',
signOut: '/auth/signout',
error: '/auth/error', // Error code passed in query string as ?error=
verifyRequest: '/auth/verify-request', // (used for check email message)
newUser: '/auth/new-user' // New users will be directed here on first sign in (leave the property out if not of interest)
}
When using this configuration, ensure that these pages actually exist. For example error: '/auth/error'
refers to a page file at pages/auth/error.js
.
See the documentation for the creating custom pages guide for more information.
callbacksβ
- Default value:
object
- Required: No
Descriptionβ
Callbacks are asynchronous functions you can use to control what happens when an action is performed.
Callbacks are extremely powerful, especially in scenarios involving JSON Web Tokens as they allow you to implement access controls without a database and to integrate with external databases or APIs.
You can specify a handler for any of the callbacks below.
callbacks: {
async signIn({ user, account, profile, email, credentials }) {
return true
},
async redirect({ url, baseUrl }) {
return baseUrl
},
async session({ session, token, user }) {
return session
},
async jwt({ token, user, account, profile, isNewUser }) {
return token
}
}
See our callbacks guide for more information on how to use the callback functions.
eventsβ
- Default value:
object
- Required: No
Descriptionβ
Events are asynchronous functions that do not return a response, they are useful for audit logging.
You can specify a handler for any of these events below - e.g. for debugging or to create an audit log.
The content of the message object varies depending on the flow (e.g. OAuth or Email authentication flow, JWT or database sessions, etc). See the events guide for more information on the form of each message object and how to use the events functions.
events: {
async signIn(message) { /* on successful sign in */ },
async signOut(message) { /* on signout */ },
async createUser(message) { /* user created */ },
async updateUser(message) { /* user updated - e.g. their email was verified */ },
async linkAccount(message) { /* account (e.g. Twitter) linked to a user */ },
async session(message) { /* session is active */ },
}
adapterβ
- Default value: none
- Required: No
Descriptionβ
By default Auth.js does not include an adapter any longer. If you would like to persist user / account data, please install one of the many available adapters. More information can be found in the adapter documentation.
debugβ
- Default value:
false
- Required: No
Descriptionβ
Set debug to true
to enable debug messages for authentication and database operations.
loggerβ
- Default value:
console
- Required: No
Descriptionβ
Override any of the logger levels (undefined
levels will use the built-in logger), and intercept logs in NextAuth. You can use this to send NextAuth logs to a third-party logging service.
The code
parameter for error
and warn
are explained in the Warnings and Errors pages respectively.
Example:
import log from "logging-service"
export default NextAuth({
...
logger: {
error(code, metadata) {
log.error(code, metadata)
},
warn(code) {
log.warn(code)
},
debug(code, metadata) {
log.debug(code, metadata)
}
}
...
})
If the debug
level is defined by the user, it will be called regardless of the debug: false
option.
themeβ
- Default value:
object
- Required: No
Descriptionβ
Changes the color scheme theme of pages as well as allows some minor customization. Set theme.colorScheme
to "light"
, if you want to force pages to always be light. Set to "dark"
, if you want to force pages to always be dark. Set to "auto"
, (or leave this option out) if you want the pages to follow the preferred system theme. (Uses the prefers-color-scheme media query.)
In addition, you can define a logo URL in theme.logo
which will be rendered above the main card in the default signin/signout/error/verify-request pages, as well as a theme.brandColor
which will affect the accent color of these pages.
theme: {
colorScheme: "auto", // "auto" | "dark" | "light"
brandColor: "", // Hex color code
logo: "" // Absolute URL to image
}
Advanced Optionsβ
Advanced options are passed the same way as basic options, but may have complex implications or side effects. You should try to avoid using advanced options unless you are very comfortable using them.
useSecureCookiesβ
- Default value:
true
for HTTPS sites /false
for HTTP sites - Required: No
Descriptionβ
When set to true
(the default for all site URLs that start with https://
) then all cookies set by Auth.js will only be accessible from HTTPS URLs.
This option defaults to false
on URLs that start with http://
(e.g. http://localhost:3000
) for developer convenience.
Properties on any custom cookies
that are specified override this option.
Setting this option to false in production is a security risk and may allow sessions to be hijacked if used in production. It is intended to support development and testing. Using this option is not recommended.
cookiesβ
- Default value:
{}
- Required: No
Descriptionβ
Cookies in Auth.js are chunked by default, meaning that once they reach the 4kb limit, we will create a new cookie with the .{number}
suffix and reassemble the cookies in the correct order when parsing / reading them. This was introduced to avoid size constraints which can occur when users want to store additional data in their sessionToken, for example.
You can override the default cookie names and options for any of the cookies used by Auth.js.
This is an advanced option and using it is not recommended as you may break authentication or introduce security flaws into your application.
You can specify one or more cookies with custom properties, but if you specify custom options for a cookie you must provide all the options for that cookie.
If you use this feature, you will likely want to create conditional behaviour to support setting different cookies policies in development and production builds, as you will be opting out of the built-in dynamic policy.
An example of a use case for this option is to support sharing session tokens across subdomains.
Exampleβ
cookies: {
sessionToken: {
name: `__Secure-next-auth.session-token`,
options: {
httpOnly: true,
sameSite: 'lax',
path: '/',
secure: true
}
},
callbackUrl: {
name: `__Secure-next-auth.callback-url`,
options: {
sameSite: 'lax',
path: '/',
secure: true
}
},
csrfToken: {
name: `__Host-next-auth.csrf-token`,
options: {
httpOnly: true,
sameSite: 'lax',
path: '/',
secure: true
}
},
pkceCodeVerifier: {
name: `${cookiePrefix}next-auth.pkce.code_verifier`,
options: {
httpOnly: true,
sameSite: 'lax',
path: '/',
secure: useSecureCookies,
maxAge: 900
}
},
state: {
name: `${cookiePrefix}next-auth.state`,
options: {
httpOnly: true,
sameSite: "lax",
path: "/",
secure: useSecureCookies,
maxAge: 900
},
},
}
Using a custom cookie policy may introduce security flaws into your application and is intended as an option for advanced users who understand the implications. Using this option is not recommended.