Skip to main content

Auth

Authentication is the process of determining the identity of a user. Common ways of authenticating a user are by asking the user for secret credentials (username & password) or by a third-party authentication provider such as Facebook or Google login.

Authorization is a related concept, which means that once we have verified the identity of a user, we can then determine what that user is allowed to do. For example, a user may be authorized to view a product, but not to edit it.

The term auth is shorthand for both authentication and authorization.

Auth in Vendure applies to both administrators and customers. Authentication is controlled by the configured AuthenticationStrategies, and authorization is controlled by the configured Roles and Permissions.

The three pillars

Vendure's authentication and authorization system is built on three pillars:

  • User Management: How administrators and customers are represented, verified, and authenticated โ€” including native login, external providers, and guest checkout.
  • Role-based Access Control: Named collections of permissions that control what each user can do, from SuperAdmin down to custom roles like "Inventory Manager".
  • Permissions: The atomic units of authorization that protect every API operation, determining exactly which actions a given role is allowed to perform.

For diagrams, code examples, and detailed explanations of each area, see the dedicated pages linked above.

Code Examples

Login mutation

By default, Vendure uses a username/email address and password to authenticate users, which is implemented by the NativeAuthenticationStrategy.

There is a login mutation available in both the Shop API and Admin API which allows a customer or administrator to authenticate using native authentication:

Admin API
Info

See the Managing Sessions guide for how to manage authenticated sessions in your storefront/client applications.

Configuring multiple authentication strategies

Custom authentication strategies are set via the VendureConfig.authOptions object:

src/vendure-config.ts

In the above example, we define the strategies available for authenticating in the Shop API and the Admin API. The NativeAuthenticationStrategy is the only one actually provided by Vendure out-of-the-box, and this is the default username/email + password strategy.

The other strategies would be custom-built (or provided by future npm packages) by creating classes that implement the AuthenticationStrategy interface.

Google authentication

Storefront setup

In your storefront, you need to integrate the Google sign-in button as described in "Integrating Google Sign-In into your web app". Successful authentication will result in a onSignIn function being called in your app. It will look something like this:

Ts

Backend

On the backend, you'll need to define an AuthenticationStrategy to take the authorization token provided by the storefront in the authenticate mutation, and use it to get the necessary personal information on that user from Google.

To do this you'll need to install the google-auth-library npm package as described in the "Authenticate with a backend server" guide.

src/plugins/authentication/google-authentication-strategy.ts

Facebook authentication

Storefront setup

This example assumes the use of the Facebook SDK for JavaScript in the storefront.

An implementation in React might look like this:

/storefront/src/components/FacebookLoginButton.tsx

Backend

/src/plugins/authentication/facebook-authentication-strategy.ts

Keycloak authentication

Here's an example of an AuthenticationStrategy intended to be used on the Admin API. The use-case is when the company has an existing identity server for employees, and you'd like your Vendure shop admins to be able to authenticate with their existing accounts.

This example uses Keycloak, a popular open-source identity management server. To get your own Keycloak server up and running in minutes, follow the Keycloak on Docker guide.

Configure a login page & Admin UI

In this example, we'll assume the login page is hosted at http://intranet/login. We'll also assume that a "login to Vendure" button has been added to that page and that the page is using the Keycloak JavaScript adapter, which can be used to get the current user's authorization token:

/login/index.html

We also need to tell the Admin UI application about the custom login URL, since we have no need for the default "username/password" login form. This can be done by setting the loginUrl property in the AdminUiConfig:

/src/vendure-config.ts

Backend

First we will need to be making an HTTP call to our Keycloak server to validate the token and get the user's details. We'll use the node-fetch library to make the HTTP call:

The strategy is very similar to the Google authentication example (they both use the OpenID Connect standard), so we'll not duplicate the explanatory comments here:

/src/plugins/authentication/keycloak-authentication-strategy.ts
Was this chapter helpful?
Report Issue
Edited Feb 23, 2026ยทEdit this page