With Authgear SDK for Next.js, you can easily integrate authentication features into your Next.js application — covering both the frontend and backend in one package. In most cases, it involves just a few lines of code to enable multiple authentication methods, such as social logins, passwordless, biometrics logins, one-time-password (OTP) with SMS/WhatsApp, and multi-factor authentication (MFA).
Quick links — 📚 Documentation · 🏁 Getting Started · 🛠️ Troubleshooting · 👥 Contributing
Authgear is a highly adaptable identity-as-a-service (IDaaS) platform for web and mobile applications. Authgear makes user authentication easier and faster to implement by integrating it into various types of applications — from single-page web apps to mobile applications to API services.
- Zero-trust authentication architecture with OpenID Connect (OIDC) standard.
- Easy-to-use interfaces for user registration and login, including email, phone, username as login ID, and password, OTP, magic links, etc.
- Support for a wide range of identity providers, such as Google, Apple, and Azure Active Directory.
- Support for Passkeys, biometric login, and Multi-Factor Authentication (MFA) such as SMS/email-based verification and authenticator apps with TOTP.
- Next.js >= 16.0.0
- React >= 19.0.0
- Node.js >= 18
npm install @authgear/nextjsFor a complete tutorial, see the Next.js integration guide on Authgear Docs, or explore the example project on GitHub.
Create a config object. The sessionSecret must be at least 32 characters and should be stored in an environment variable.
// lib/authgear.ts
import type { AuthgearConfig } from "@authgear/nextjs";
export const authgearConfig: AuthgearConfig = {
endpoint: process.env.AUTHGEAR_ENDPOINT!, // e.g. "https://myapp.authgear.cloud"
clientID: process.env.AUTHGEAR_CLIENT_ID!,
redirectURI: process.env.AUTHGEAR_REDIRECT_URI!, // e.g. "http://localhost:3000/api/auth/callback"
sessionSecret: process.env.SESSION_SECRET!, // min 32 chars
};Create a catch-all route to handle all auth endpoints (/api/auth/login, /api/auth/callback, /api/auth/logout, /api/auth/refresh, /api/auth/userinfo).
// app/api/auth/[...authgear]/route.ts
import { createAuthgearHandlers } from "@authgear/nextjs";
import { authgearConfig } from "@/lib/authgear";
export const { GET, POST } = createAuthgearHandlers(authgearConfig);Wrap your app with AuthgearProvider to enable client-side hooks and components.
// app/layout.tsx
import { AuthgearProvider } from "@authgear/nextjs/client";
export default function RootLayout({ children }: { children: React.ReactNode }) {
return (
<html>
<body>
<AuthgearProvider>{children}</AuthgearProvider>
</body>
</html>
);
}Create a proxy.ts file at the root of your project to automatically redirect unauthenticated users and inject auth headers.
// proxy.ts
import { createAuthgearProxy } from "@authgear/nextjs/proxy";
import { authgearConfig } from "@/lib/authgear";
export const proxy = createAuthgearProxy({
...authgearConfig,
protectedPaths: ["/dashboard/*", "/profile/*"],
});Use the useAuthgear hook or the built-in buttons:
"use client";
import { useAuthgear, SignInButton, SignOutButton } from "@authgear/nextjs/client";
export function NavBar() {
const { isAuthenticated, isLoaded, user } = useAuthgear();
if (!isLoaded) return null;
return isAuthenticated ? (
<div>
<span>Welcome, {user?.email}</span>
<SignOutButton />
</div>
) : (
<SignInButton />
);
}Use currentUser() to get the authenticated user in Server Components and Route Handlers.
// app/dashboard/page.tsx
import { currentUser } from "@authgear/nextjs/server";
import { authgearConfig } from "@/lib/authgear";
import { redirect } from "next/navigation";
export default async function DashboardPage() {
const user = await currentUser(authgearConfig);
if (!user) redirect("/api/auth/login?returnTo=/dashboard");
return <h1>Hello, {user.email}</h1>;
}Use verifyAccessToken() to validate a Bearer token in API routes.
// app/api/me/route.ts
import { verifyAccessToken } from "@authgear/nextjs/server";
import { authgearConfig } from "@/lib/authgear";
import { NextRequest, NextResponse } from "next/server";
export async function GET(request: NextRequest) {
const authHeader = request.headers.get("Authorization");
const token = authHeader?.replace("Bearer ", "");
if (!token) return NextResponse.json({ error: "unauthorized" }, { status: 401 });
try {
const payload = await verifyAccessToken(token, authgearConfig);
return NextResponse.json({ sub: payload.sub });
} catch {
return NextResponse.json({ error: "invalid_token" }, { status: 401 });
}
}Use auth() to get the session (including a fresh access token) without fetching user info. This is the right choice for Server Actions that need to call a downstream API on behalf of the user — auth() will auto-refresh the token if expired before returning it.
"use server";
import { auth, SessionState } from "@authgear/nextjs/server";
import { authgearConfig } from "@/lib/authgear";
export async function callMyApiAction() {
const session = await auth(authgearConfig);
if (session.state !== SessionState.Authenticated || !session.accessToken) {
throw new Error("Not authenticated");
}
// session.accessToken is always fresh — auto-refreshed if it was expired
const res = await fetch("https://api.example.com/data", {
headers: { Authorization: `Bearer ${session.accessToken}` },
});
return res.json();
}| Export | Kind | Values | Description |
|---|---|---|---|
createAuthgearHandlers(config) |
Function | — | Returns { GET, POST } for app/api/auth/[...authgear]/route.ts |
PromptOption |
Enum | "login" | "none" |
Convenience constants for the OIDC prompt parameter. Pass to signIn({ prompt: PromptOption.Login }) to force the login form for a specific sign-in call. |
| Export | Description |
|---|---|
auth(config) |
Returns the current Session, auto-refreshes access token if expired |
currentUser(config) |
Returns UserInfo | null, auto-refreshes access token if expired |
verifyAccessToken(token, config) |
Verifies a JWT Bearer token with JWKS, returns JWTPayload |
getOpenURL(page, config) |
Returns a URL to open an Authgear page (e.g. Page.Settings) with the user pre-authenticated |
| Export | Description |
|---|---|
<AuthgearProvider> |
React context provider, must wrap the app |
useAuthgear() |
Returns { state, user, isLoaded, isAuthenticated, signIn, signOut, openPage } |
useUser() |
Returns UserInfo | null |
<SignInButton> |
Button that calls signIn() on click |
<SignOutButton> |
Button that calls signOut() on click |
<UserSettingsButton> |
Button that opens Authgear account settings in a new tab |
AuthgearProvider props:
| Prop | Default | Description |
|---|---|---|
openPagePath |
"/api/auth/open" |
Route used by openPage() and <UserSettingsButton> to pre-authenticate and redirect to an Authgear page |
Options accepted by signIn() (from useAuthgear()) and the signInOptions prop on <SignInButton>.
| Field | Type | Required | Default | Description |
|---|---|---|---|---|
returnTo |
string |
No | — | Path to redirect to after sign-in. |
loginPath |
string |
No | "/api/auth/login" |
Override the login route for this call. |
prompt |
string |
No | — | OIDC prompt value for this sign-in call. Use PromptOption.Login to force the login form. Overrides the global isSSOEnabled setting. |
| Export | Description |
|---|---|
createAuthgearProxy(options) |
Returns a Next.js 16 proxy() function |
createAuthgearProxy options (extends AuthgearConfig):
| Option | Default | Description |
|---|---|---|
protectedPaths |
[] |
Paths requiring auth, supports * suffix (e.g. "/dashboard/*") |
publicPaths |
["/api/auth/*"] |
Paths always allowed through |
loginPath |
"/api/auth/login" |
Where to redirect unauthenticated users |
| Field | Required | Description |
|---|---|---|
endpoint |
✓ | Authgear endpoint, e.g. "https://myapp.authgear.cloud" |
clientID |
✓ | OAuth client ID |
redirectURI |
✓ | OAuth callback URL, e.g. "http://localhost:3000/api/auth/callback" |
sessionSecret |
✓ | Secret for encrypting session cookie (min 32 chars) |
postLogoutRedirectURI |
Where to redirect after logout. Defaults to "/" |
|
scopes |
OAuth scopes. Defaults to ["openid", "offline_access", "https://authgear.com/scopes/full-userinfo"] |
|
isSSOEnabled |
When false, always shows the Authgear login form (prompt=login), even if the user has an existing Authgear session. Recommended for single-app deployments. Defaults to true |
|
cookieName |
Session cookie name. Defaults to "authgear.session" |
This SDK is actively maintained. Feature requests and contributions are welcome via GitHub Issues.
- SDK Documentation: https://authgear.github.io/authgear-sdk-nextjs/
- Learn how to set up an Authgear application at https://docs.authgear.com/
- Learn how to manage your users through the Admin API
Please check out the Get Help section for solutions to common issues.
To provide feedback or report a bug, please raise an issue on our issue tracker.
Anyone who wishes to contribute to this project, whether documentation, features, bug fixes, code cleanup, testing, or code reviews, is very much encouraged to do so.
To join, raise your hand on the Authgear Discord server or the GitHub discussions board.
git clone git@github.com:authgear/authgear-sdk-nextjs.git
cd authgear-sdk-nextjs
npm install
npm testAuthgear is a highly adaptable identity-as-a-service (IDaaS) platform for web and mobile applications. To learn more, visit authgear.com.