Dead-simple magic link authentication that is useful, lightweight, and uncluttered.
npm install mikroauthDead-simple magic link authentication that is useful, lightweight, and uncluttered.



---
- Ever wanted to have your own Firebase Auth-like magic link authentication? Look no further, this is it!
- Secure magic link (email) login solution using JWTs
- Customizable text and HTML email templates
- Can be used as a library or exposed directly as an API
- Can be used with in-memory providers for storage and email or with providers for PikoDB and MikroMail
- Just ~8kb gzipped, using only four (max) lightweight dependencies:
- MikroConf for handling config options;
- PikoDB and MikroMail for sending emails and persisting data;
- MikroServe when exposing MikroAuth as an API.
- Application-layer encryption using AES-256-GCM (zero dependencies)
- High test coverage
- MikroAuth client library
- MikroAuth example (requires MikroAuth running)
``bash`
npm install mikroauth -S
`typescript
import { MikroAuth } from 'mikroauth';
(async () => {
// Uses in-memory providers by default if none are explicitly passed into MikroAuth
const auth = new MikroAuth({
appUrl: 'https://acmecorp.xyz/app',
jwtSecret: 'your-secret-signing-key-for-jwts'
});
await auth.createMagicLink({
email: 'sam.person@acmecorp.xyz',
// Optional: override subject, appUrl, or add metadata
// subject: 'Welcome to ACME Corp',
// appUrl: 'https://custom.acmecorp.xyz/login',
// metadata: { userName: 'Sam' }
});
// Close manually since there is a persistent event loop started by MikroAuth
process.exit(0);
})();
`
`typescript
import { MikroAuth, PikoDBProvider, MikroMailProvider } from 'mikroauth';
import { PikoDB } from 'pikodb';
(async () => {
// Using MikroMail to send emails
const email = new MikroMailProvider({
user: 'me@mydomain.com',
password: 'YOUR_PASSWORD_HERE',
host: 'smtp.email-provider.com'
});
// Create a PikoDB provider with optional encryption
const storage = new PikoDBProvider(
new PikoDB({ databaseDirectory: 'mikroauth' }),
process.env.STORAGE_KEY // Optional encryption key
);
await storage.start();
// Initializing MikroAuth with our providers
const auth = new MikroAuth(
{
appUrl: 'https://acmecorp.xyz/app',
jwtSecret: 'your-secret-signing-key-for-jwts',
// Additional options you can set
magicLinkExpirySeconds: 15 * 60,
jwtExpirySeconds: 60 * 60,
refreshTokenExpirySeconds: 7 24 60 * 60,
maxActiveSessions: 3,
templates: null,
debug: false
},
email,
storage
);
await auth.createMagicLink({
email: 'sam.person@acmecorp.xyz'
});
// Close manually since there is a persistent event loop started by MikroAuth
process.exit(0);
})();
`
`ts
import { MikroAuth } from 'mikroauth';
const mikroAuth = new MikroAuth({
auth: { jwtSecret: 'your-secret' },
email: { user: 'noreply@example.com' }
});
// Programmatic token creation (e.g., for SSO)
const tokens = await mikroAuth.createToken({
email: 'user@example.com',
username: 'john_doe',
role: 'admin',
ip: '192.168.1.1' // optional
});
// Returns:
// {
// accessToken: 'eyJhbGc...',
// refreshToken: 'abc123...',
// exp: 3600,
// tokenType: 'Bearer'
// }
`
Magic links are a simple, yet powerful, passwordless authentication flow that works by sending a secure login link directly to the user's email. It's as simple as:
`text`
┌────────┐ ┌────────┐
│ User │ │ Server │
└───┬────┘ └───┬────┘
│ │
│ 1. Enter email address │
│ ───────────────────────────────────────────► X
│ │
│ │ 2. Generate unique token
│ │ Store token with email
│ │
│ 3. Send email with magic link │
X ◄─────────────────────────────────────────── │
│ │
│ 4. Click magic link │
│ ───────────────────────────────────────────► X
│ │
│ │ 5. Validate token
│ │ Create session
│ │
│ 6. Return JWT + refresh token │
X ◄─────────────────────────────────────────── │
│ │
When a users request access, they provide only their email address. MikroAuth generates a cryptographically secure token (using SHA-256 with email, timestamp, and random data), stores it with an expiration time, and emails a link containing this token to the user.
Then, when the user clicks the link, MikroAuth validates the token, creates a session (JWT for authentication and a refresh token for maintaining the session), and logs them in securely - all without requiring a password.
MikroAuth also includes safeguards against abuse by invalidating existing magic links when new ones are requested, enforcing link expiration times, preventing token reuse, and managing multiple sessions for the same user.
---
Settings can be provided in multiple ways.
- They can be provided via the CLI, e.g. node app.js --port 1234.process.env.PORT
- Certain values can be provided via environment variables.
- Port: - numberprocess.env.HOST
- Host: - stringprocess.env.DEBUG
- Debug: - booleannew MikroAuth({ port: 1234 })
- Programmatically/directly via scripting, e.g. .mikroauth.config.json
- They can be placed in a configuration file named (plain JSON), which will be automatically applied on load.
| CLI argument | CLI value | JSON (config file) value | Environment variable |
|-----------------------------|---------------------------------------------------------------|------------------------------------|----------------------|
| --jwtSecret | | auth.jwtSecret | AUTH_JWT_SECRET |
| --magicLinkExpirySeconds | | auth.magicLinkExpirySeconds | |
| --jwtExpirySeconds | | auth.jwtExpirySeconds | |
| --refreshTokenExpirySeconds | | auth.refreshTokenExpirySeconds | |
| --maxActiveSessions | | auth.maxActiveSessions | |
| | | auth.templates | |
| --appUrl | | auth.appUrl | APP_URL |
| --debug | none (is flag) | auth.debug | DEBUG |
| --emailSubject | | email.emailSubject | |
| --emailHost | | email.user | EMAIL_USER |
| --emailUser | | email.host | EMAIL_HOST |
| --emailPassword | | email.password | EMAIL_PASSWORD |
| --emailPort | | email.port | |
| --emailSecure | none (is flag) | email.secure | |
| --emailMaxRetries | | email.maxRetries | |
| --debug | none (is flag) | email.debug | DEBUG |
| --dir | | storage.databaseDirectory | |
| --encryptionKey | | storage.encryptionKey | STORAGE_KEY |
| --debug | none (is flag) | storage.debug | DEBUG |
| --port | | server.port | PORT |
| --host | | server.host | HOST |
| --https | none (is flag) | server.useHttps | |
| --http2 | none (is flag) | server.useHttp2 | |
| --cert | | server.sslCert | |
| --key | | server.sslKey | |
| --ca | | server.sslCa | |
| --ratelimit | none (is flag) | server.rateLimit.enabled | |
| --rps | | server.rateLimit.requestsPerMinute | |
| --allowed | (array of strings in JSON config) | server.allowedDomains | |
| --debug | none (is flag) | server.debug | DEBUG |
_Setting debug mode in CLI arguments will enable debug mode across all areas. To granularly define this, use a config file._
As per MikroConf behavior, the configuration sources are applied in this order:
1. Command line arguments (highest priority)
2. Programmatically provided config
3. Config file (JSON)
4. Default values (lowest priority)
Defaults shown and explained.
`typescript`
{
// The base URL to use in the magic link, before appending "?token=TOKEN_VALUE&email=EMAIL_ADDRESS"
appUrl: 'https://acmecorp.xyz/app',
// Your secret JWT signing key
jwtSecret: 'your-secret-signing-key-for-jwts',
// Time until magic link expires (15 min)
magicLinkExpirySeconds: 15 * 60,
// Time until JWT expires (60 minutes)
jwtExpirySeconds: 60 * 60,
// Time until refresh token expires (7 days)
refreshTokenExpirySeconds: 7 24 60 * 60,
// How many active sessions can a user have?
maxActiveSessions: 3,
// Custom email templates to use
templates: null,
// Use debug mode?
debug: false
}
Templates are passed in as an object with a function each to create the text and HTML versions of the magic link email.
`typescriptSign in to your service. Go to ${magicLink} — the link expires in ${expiryMinutes} minutes.
{
// ...
templates: {
textVersion: (magicLink: string, expiryMinutes: number) =>
,
htmlVersion: (magicLink: string, expiryMinutes: number) =>
Go to ${magicLink} — the link expires in ${expiryMinutes} minutes.
}
}
`#### Using Metadata in Templates
Templates can optionally accept a metadata parameter that allows you to dynamically customize email content. This is useful for personalization, conditional content, and context-specific messaging.
`typescript
{
// ...
templates: {
textVersion: (magicLink: string, expiryMinutes: number, metadata?: Record) => {
const userName = metadata?.userName || 'User';
const greeting = metadata?.isNewUser
? Welcome to our platform, ${userName}!
: Welcome back, ${userName}!; return
${greeting}\n\nClick here to login: ${magicLink}\nThis link expires in ${expiryMinutes} minutes.;
},
htmlVersion: (magicLink: string, expiryMinutes: number, metadata?: Record) => {
const userName = metadata?.userName || 'User';
const greeting = metadata?.isNewUser
? Welcome to our platform, ${userName}!
: Welcome back, ${userName}!; return
This link expires in ${expiryMinutes} minutes.
;
}
}
}
`To pass metadata when creating a magic link:
`typescript
await auth.createMagicLink({
email: 'sam.person@acmecorp.xyz',
metadata: {
userName: 'Sam Person',
isNewUser: false,
companyName: 'ACME Corp',
lastLogin: '2025-01-15'
}
});
`You can use metadata for various use cases:
- Personalization: Include user names, company names, or other personal details
- Conditional content: Show different messages for new vs. returning users
- Contextual information: Display recent activity, account status, or special offers
- Localization: Customize content based on user language preferences
- Dynamic data: Include arrays, objects, or any structured data you need
#### Overriding App URL Per Magic Link
You can override the
appUrl on a per-magic link basis, which is useful when serving multiple applications from a single authentication portal. This allows you to dynamically specify which application the user should be redirected to after clicking the magic link.`typescript
await auth.createMagicLink({
email: 'user@example.com',
appUrl: 'https://app1.example.com/auth/callback'
});// Different user, different application
await auth.createMagicLink({
email: 'admin@example.com',
appUrl: 'https://admin-portal.example.com/login'
});
`The
appUrl override works alongside metadata, so you can customize both the destination URL and email content:`typescript
await auth.createMagicLink({
email: 'user@example.com',
appUrl: 'https://custom-app.example.com',
metadata: {
userName: 'John Doe',
applicationName: 'Custom App'
}
});
`Common use cases for
appUrl overrides:- Multi-tenant applications: Direct users to their specific tenant/organization subdomain
- Authentication portal: Single MikroAuth instance serving multiple applications
- Environment-specific redirects: Send users to staging vs. production based on context
- Role-based routing: Direct admins to admin portal, users to user portal
- Deep linking: Send users to specific pages within your application
The overridden
appUrl must be a valid URL format, otherwise the magic link creation will fail. If no override is provided, the default appUrl from configuration is used.#### Overriding Email Subject Per Magic Link
You can override the email subject on a per-magic link basis, which is useful when you want to customize the email subject for different contexts, applications, or user types.
`typescript
await auth.createMagicLink({
email: 'user@example.com',
subject: 'Welcome to ACME Corp Portal'
});// Different user, different subject
await auth.createMagicLink({
email: 'admin@example.com',
subject: 'Admin Portal Login Link'
});
`The
subject override works alongside appUrl and metadata, so you can customize the email subject, destination URL, and content all at once:`typescript
await auth.createMagicLink({
email: 'user@example.com',
subject: 'Sign in to Premium Dashboard',
appUrl: 'https://premium.example.com',
metadata: {
userName: 'John Doe',
tier: 'Premium'
}
});
`Common use cases for
subject overrides:- Multi-tenant applications: Customize subject lines with organization or tenant names
- Context-specific messaging: Different subjects for onboarding vs. returning users
- Application-specific branding: Match subject lines to different products or portals
- Localization: Provide subjects in different languages based on user preferences
- Priority or urgency indicators: Add context like "Urgent", "Action Required", etc.
- Event-driven authentication: Customize subjects for password resets, security alerts, etc.
If no override is provided, the default
emailSubject from configuration is used.$3
Defaults shown and explained.
`typescript
{
// The subject line for the email
emailSubject: 'Your Secure Login Link',
// The user identity sending the email from your email provider
user: process.env.EMAIL_USER || '',
// The SMTP host of your email provider
host: process.env.EMAIL_HOST || '',
// The password for the user identity
password: process.env.EMAIL_PASSWORD || '',
// The port to use (465 is default for "secure")
port: 465,
// If true, sets port to 465
secure: true,
// How many deliveries will be attempted?
maxRetries: 2,
// Use debug mode?
debug: false
}
`See MikroMail for more details.
Server Mode
MikroAuth has built-in functionality to be exposed directly as a server or API using MikroServe.
Some nice features of running MikroAuth in server mode include:
- You get a zero-config-needed API for handling magic links
- JSON-based request and response format
- Configurable server options
- Support for both HTTP, HTTPS, and HTTP2
- Graceful shutdown handling
$3
`bash
npx mikroauth
`Configuring the server (API) settings follows the conventions of MikroServe; please see that documentation for more details. In short, in this case, you can supply configuration in several ways:
- Configuration file, named
mikroauth.config.json
- CLI arguments
- Environment variablesThe only difference compared to regular MikroServe usage is that the server configuration object (if used) must be nested in a
server object, and authentication settings in an auth object. For example, if you want to set the port value to 8080, your configuration would look like this:`json
{
"server": {
"port": 8080
},
"auth": {
"tokenExpiry": 3600,
"refreshTokenExpiry": 86400
}
}
`$3
#### Create Magic Link: Log In (Sign In)
`text
POST /login
`Request body:
`json
{
"email": "user@example.com"
}
`Response:
`json
{
"message": "Some informational message"
}
`#### Verify Token
`text
POST /verify
`Request body:
`json
{
"email": "user@example.com"
}
`Headers:
`text
Authorization: Bearer {token}
`Response:
`json
{
"accessToken": "jwt-token",
"refreshToken": "refresh-token",
"expiresIn": 3600,
"tokenType": "Bearer"
}
`#### Refresh Access Token
`text
POST /refresh
`Request body:
`json
{
"refreshToken": "refresh-token"
}
`Response:
`json
{
"accessToken": "new-jwt-token",
"refreshToken": "new-refresh-token",
"expiresIn": 3600,
"tokenType": "Bearer"
}
`#### Get Sessions
`text
GET /sessions
`Headers:
`text
Authorization: Bearer {token}
`Response:
`json
[
{
"id": "session-id",
"createdAt": "timestamp",
"lastLogin": "timestamp",
"lastUsed": "timestamp",
"metadata": {
"ip": "127.0.0.1"
},
"isCurrentSession": true/false
}
]
`#### Revoke Sessions
`text
DELETE /sessions
`Headers:
`text
Authorization: Bearer {token}
`Request body:
`json
{
"refreshToken": "refresh-token"
}
`Response:
`json
{
"message": "Some informational message"
}
`#### Log Out (Sign Out)
`text
POST /logout
`Headers:
`text
Authorization: Bearer {token}
`Request body:
`json
{
"refreshToken": "refresh-token-to-invalidate"
}
`Response:
`json
{
"message": "Some informational message"
}
`$3
All endpoints return appropriate HTTP status codes:
-
200: Success
- 401: Unauthorized (missing or invalid token)
- 404: Not found or operation failed
- 500: Internal server error$3
MikroAuth supports customizable providers for:
1. Email delivery - for sending magic links
2. Storage - for persisting tokens and sessions
By default, it uses in-memory providers suitable for development:
-
InMemoryEmailProvider
- InMemoryStorageProviderYou can implement your own providers by following the interfaces defined in the package.
#### Email Providers
MikroAuth includes built-in support for multiple email providers:
##### SMTP-Based Provider
MikroMailProvider - Uses SMTP for email delivery via MikroMail
`typescript
import { MikroAuth, MikroMailProvider } from 'mikroauth';const email = new MikroMailProvider({
user: 'me@mydomain.com',
password: 'YOUR_PASSWORD_HERE',
host: 'smtp.email-provider.com',
port: 465,
secure: true
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`##### API-Based Providers
All API-based providers use native
fetch with zero dependencies:ResendProvider - Modern transactional email API
`typescript
import { MikroAuth, ResendProvider } from 'mikroauth';const email = new ResendProvider({
apiKey: 're_your_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`BrevoProvider - Formerly Sendinblue, popular transactional email service
`typescript
import { MikroAuth, BrevoProvider } from 'mikroauth';const email = new BrevoProvider({
apiKey: 'your_brevo_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`PostmarkProvider - Reliable transactional email delivery
`typescript
import { MikroAuth, PostmarkProvider } from 'mikroauth';const email = new PostmarkProvider({
serverToken: 'your_postmark_server_token_here',
messageStream: 'outbound', // Optional, defaults to 'outbound'
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`SendGridProvider - Twilio SendGrid email API
`typescript
import { MikroAuth, SendGridProvider } from 'mikroauth';const email = new SendGridProvider({
apiKey: 'SG.your_sendgrid_api_key_here',
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`AWSESProvider - Amazon Simple Email Service (SES) v2 API
`typescript
import { MikroAuth, AWSESProvider } from 'mikroauth';const email = new AWSESProvider({
accessKeyId: 'YOUR_AWS_ACCESS_KEY_ID',
secretAccessKey: 'YOUR_AWS_SECRET_ACCESS_KEY',
region: 'us-east-1', // Your AWS region
debug: false // Optional
});
const auth = new MikroAuth(
{ appUrl: 'https://acmecorp.xyz/app', jwtSecret: 'your-secret' },
email
);
`Notes:
- All API providers require verified sender addresses/domains per the provider's requirements
- API providers have no additional dependencies and use native Node.js
fetch
- Error responses from the APIs are thrown as errors with status and response properties$3
#### HTTPS/HTTP2 Configuration
To enable HTTPS or HTTP2, provide the following options when starting the server:
`javascript
const server = startServer({
useHttps: true,
// OR
useHttp2: true,
sslCert: '/path/to/certificate.pem',
sslKey: '/path/to/private-key.pem',
sslCa: '/path/to/ca-certificate.pem' // Optional
});
`#### Generating Self-Signed Certificates (for testing)
`bash
Generate a private key
openssl genrsa -out private-key.pem 2048Generate a certificate signing request
openssl req -new -key private-key.pem -out csr.pemGenerate a self-signed certificate (valid for 365 days)
openssl x509 -req -days 365 -in csr.pem -signkey private-key.pem -out certificate.pem
`Future Ideas and Known Issues
- WebAuthn support?
- Emit events (emails?) for failed auth and such things?
- Add artificial delay to simulate waiting when trying to login as non-existent user?
License
MIT. See the
LICENSE` file.