Remix Auth OTP 💿
A One-Time Password Authentication Strategy for Remix Auth.
Features
- 😌 Easy to Setup. The Strategy handles the entire authentication flow for you.
- 🔐 Secure. Encrypted single-use codes.
- 📧 Magic Link Built-In. Authenticate your users with a simple click.
- 📚 One Source of Truth. The database of your choice.
- 🛡 Bulletproof. Written in strict TypeScript with a high test coverage.
- 🚀 Built on top of Remix Auth. An amazing authentication library for Remix.
Live Demo
We've created a simple template demo that displays the authentication workflow. Feel free to test it here.
Getting Started
The Strategy uses a password-less authentication flow based on email-code validation.
The user will receive an email with a code that can be used to authenticate itself. The code has just a single use and it's valid for a short period of time, which makes it secure and reliable.
Let's see how we can implement this Strategy for our Remix App.
Note All the code examples are written in TypeScript. Feel free to use JavaScript instead and adapt the code to your needs.
Package
First things first, we'll require to install the package.
npm install remix-auth-otp
Database
We'll require a database to store our encrypted codes. The OTP model has no relations with any other model, this simplifies the process of generating the codes and makes it easier to be implemented into any database of your choice.
In this example we'll use Prisma ORM with a SQLite database. As long as your database model looks like the following one, you are good to go.
// prisma/schema.prisma
// The model only requires 3 fields: code, active and attempts.
// ...
// The `code` field should be a String.
// The `active` field should be a Boolean and be set to false by default.
// The `attempts` field should be an Int (Number) and be set to 0 by default.
// ...
// The `createdAt` and `updatedAt` fields are optional, and not required.
model Otp {
id String @id @default(cuid())
code String @unique
active Boolean @default(false)
attempts Int @default(0)
createdAt DateTime @default(now())
updatedAt DateTime @updatedAt
}
Email Service
We'll require an Email Service to send the codes to our users. Feel free to use any service of your choice like Mailgun, Sendgrid, Mailchimp, etc.
The goal is to have a sender function similar to the following one.
// app/services/email.server.ts
export interface SendEmailBody {
sender: {
name: string
email: string
}
to: {
name?: string
email: string
}[]
subject: string
htmlContent: string
}
export async function sendEmail(body: SendEmailBody) {
return fetch(`https://any-email-service.com`, {
method: 'post',
headers: {
Accept: 'application/json',
'Api-Key': process.env.EMAIL_PROVIDER_API_KEY,
'Content-Type': 'application/json',
},
body: JSON.stringify({ ...body }),
})
}
Session Storage
We'll require to initialize a new Cookie Session Storage to work with.
The Session will be used to store the user data and everything related to the authentication flow.
Create a file called session.server.ts
wherever you want.
Implement the following code and replace the secrets
property with a strong string into your .env
file.
// app/services/session.server.ts
import { createCookieSessionStorage } from '@remix-run/node'
export const sessionStorage = createCookieSessionStorage({
cookie: {
name: '_session',
sameSite: 'lax',
path: '/',
httpOnly: true,
secrets: [process.env.SESSION_SECRET || 'STRONG_SECRET'],
secure: process.env.NODE_ENV === 'production',
},
})
export const { getSession, commitSession, destroySession } = sessionStorage
Strategy Instance
Now that we have everything set up, we can start creating the Strategy Instance.
1. Creating the Strategy Instance.
Create a file called auth.server.ts
wherever you want.
Implement the following code and replace the secret
property with a strong string into your .env
file.
// app/services/auth.server.ts
import type { User } from '@prisma/client'
import { Authenticator } from 'remix-auth'
import { OTPStrategy } from 'remix-auth-otp'
import { sessionStorage } from './session.server'
import { sendEmail } from './email.server'
import { db } from '~/db'
export let authenticator = new Authenticator<User>(sessionStorage, {
throwOnError: true,
})
authenticator.use(
new OTPStrategy(
{
secret: 'STRONG_SECRET',
storeCode: async (code) => {},
sendCode: async ({ email, code, magicLink, user, form, request }) => {},
validateCode: async (code) => {},
invalidateCode: async (code, active, attempts) => {},
},
async ({ email, code, form, magicLink, request }) => {},
),
)
Note You can specify how long a session should last by passing a
maxAge
value in milliseconds. Default value isundefined
, which will not persist the session across browsers restarts.
2. Setting Up the Strategy Options.
The Strategy Instance requires the following methods: storeCode
, sendCode
, validateCode
and invalidateCode
. It's important to note that all of them are required.
Each of these functions can be extracted to a separate file, but for the sake of simplicity, we'll keep them in the same one.
// app/services/auth.server.ts
authenticator.use(
new OTPStrategy({
// Store encrypted code in database.
// It should return a Promise<void>.
storeCode: async (code) => {
await db.otp.create({
data: {
code: code,
active: true,
attempts: 0
},
})
},
// Send code to the user.
// It should return a Promise<void>.
sendCode: async ({ email, code, magicLink, user, form, request }) => {
const sender = { name: 'Remix Auth', email: 'localhost@example.com' }
const to = [{ email }]
const subject = `Here's your OTP Code.`
const htmlContent = `
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html charset=UTF-8" />
</head>
<body>
<h1>Code: ${code}</h1>
${magicLink && `<p>Alternatively, you can click the Magic Link: ${magicLink}</p>`}
</body>
</html>
`
// Call provider sender email function.
await sendEmail({ sender, to, subject, htmlContent })
},
// Validate code.
// It should return a Promise<{code: string, active: boolean, attempts: number}>.
validateCode: async (code) => {
const otp = await db.otp.findUnique({
where: {
code: code,
},
})
if (!otp) throw new Error('OTP code not found.')
return {
code: otp.code,
active: otp.active,
attempts: otp.attempts,
}
},
// Invalidate code.
// It should return a Promise<void>.
invalidateCode: async (code, active, attempts) => {
if (!active) {
await prisma.otp.delete({
where: {
code: code
}
})
} else {
await db.otp.update({
where: {
code: code,
},
data: {
active: active,
attempts: attempts,
},
})
}
},
async ({ email, code, magicLink, form, request }) => {},
}),
)
All of this CRUD methods should be replaced and adapted with the ones provided by your database.
3. Creating the User and returning it.
The Strategy has a verify function that will be called before authenticating the user. This should return the user data that will be stored in Session.
authenticator.use(
new OTPStrategy(
{
// We've already set up this options.
// secret: 'STRONG_SECRET',
// storeCode: async (code) => {},
// ...
},
async ({ email, code, magicLink, form, request }) => {
// You can determine whether the user is authenticating
// via OTP submission or Magic Link and run your own logic.
if (form) console.log('Optional form submission logic.')
if (magicLink) console.log('Optional magic link submission logic.')
// Get user from database.
let user = await db.user.findFirst({
where: { email },
})
// Create new user.
if (!user) {
user = await db.user.create({
data: { email },
})
}
// Return user as Session.
return user
},
),
)
And that's it! Feel free to check the Example Code implementation in case you wanna use it as a reference.
Auth Routes
Last but not least, we'll require to create the routes that will handle the authentication flow.
Create the following files inside the app/routes
folder.
login.tsx
// app/routes/login.tsx
import type { DataFunctionArgs } from '@remix-run/node'
import { json } from '@remix-run/node'
import { Form, useLoaderData } from '@remix-run/react'
import { authenticator } from '~/services/auth.server'
import { getSession, commitSession } from '~/services/session.server'
export async function loader({ request }: DataFunctionArgs) {
const user = await authenticator.isAuthenticated(request, {
successRedirect: '/account',
})
const session = await getSession(request.headers.get('Cookie'))
const hasSentEmail = session.has('auth:otp')
const email = session.get('auth:email')
const error = session.get(authenticator.sessionErrorKey)
// Commits Session to clear any possible error message.
return json(
{ user, hasSentEmail, email, error },
{
headers: {
'Set-Cookie': await commitSession(session),
},
},
)
}
export async function action({ request }: DataFunctionArgs) {
await authenticator.authenticate('OTP', request, {
// Setting `successRedirect` it's required.
// ...
// User is not authenticated yet.
// We want to redirect to the verify code form. (/verify-code or any other route)
successRedirect: '/login',
// Setting `failureRedirect` it's required.
// ...
// We want to display any possible error message.
// Otherwise the ErrorBoundary / CatchBoundary will be triggered.
failureRedirect: '/login',
})
}
export default function Login() {
let { user, hasSentEmail, email, error } = useLoaderData<typeof loader>()
return (
<div style={{ fontFamily: 'system-ui, sans-serif', lineHeight: '1.4' }}>
{/* Renders any possible error messages. */}
{error && <strong>Error: {error.message}</strong>}
{/* Renders the form that sends the email. */}
{!user && !hasSentEmail && (
<Form method="post">
<label htmlFor="email">Email</label>
<input name="email" placeholder="Insert email .." required />
<button type="submit">Send Code</button>
</Form>
)}
{/* Renders the form that verifies the code. */}
{hasSentEmail && (
<div style={{ display: 'flex', flexDirection: 'row' }}>
<Form method="post">
<label htmlFor="code">Code</label>
<input type="text" name="code" placeholder="Insert code .." required />
<button type="submit">Continue</button>
</Form>
{/* Renders the form that requests a new code. */}
{/* Email input is not required, the email is already in Session. */}
<Form method="post">
<button type="submit">Request new Code</button>
</Form>
</div>
)}
</div>
)
}
account.tsx
// app/routes/account.tsx
import type { DataFunctionArgs } from '@remix-run/node'
import { json } from '@remix-run/node'
import { Form, useLoaderData } from '@remix-run/react'
import { authenticator } from '~/services/auth.server'
export async function loader({ request }: DataFunctionArgs) {
const user = await authenticator.isAuthenticated(request, {
failureRedirect: '/',
})
return json({ user })
}
export default function Account() {
let { user } = useLoaderData<typeof loader>()
return (
<div style={{ fontFamily: 'system-ui, sans-serif', lineHeight: '1.4' }}>
<h1>{user ? `Welcome ${user.email}` : 'Authenticate'}</h1>
<Form action="/logout" method="post">
<button>Log Out</button>
</Form>
</div>
)
}
magic-link.tsx
// app/routes/magic-link.tsx
import type { DataFunctionArgs } from '@remix-run/node'
import { authenticator } from '~/services/auth.server'
export async function loader({ request }: DataFunctionArgs) {
await authenticator.authenticate('OTP', request, {
successRedirect: '/account',
failureRedirect: '/login',
})
}
logout.tsx
// app/routes/logout.tsx
import type { DataFunctionArgs } from '@remix-run/node'
import { authenticator } from '~/services/auth.server'
export async function action({ request }: DataFunctionArgs) {
return await authenticator.logout(request, { redirectTo: '/' })
}
Done! 🎉 You can now start your server and test the authentication flow.
Options and Customization
The Strategy includes a few options that can be customized.
Email Validation
The email validation function will validate every email against the regular expression /.+@.+/
.
You can customize it by passing a function called validateEmail
to the OTPStrategy Instance.
This can be used to verify that the provided email is not a disposable one.
authenticator.use(
new OTPStrategy({
validateEmail: async (email) => {
// Handles email validation.
},
// storeCode: async (code) => {},
// sendCode: async ({ email, ... }) => {},
// ...
}),
)
Code Generation
The Code output can be customized by passing an Object called codeGeneration
to the OTPStrategy Instance.
Here are its available options:
/**
* The code generation configuration.
*/
export interface CodeGenerationOptions {
/**
* How long the OTP code will be valid.
* @default 900000 Default is 15 minutes in milliseconds. (1000 * 60 * 15)
*/
expiresAt?: number
/**
* How many times an invalid OTP code can be inputted.
* @default 3
*/
maxAttempts?: number
/**
* How long the OTP code will be in length.
* @default 6
*/
length?: number
/**
* Whether the OTP code should contain digits.
* @default false
*/
digits?: boolean
/**
* Whether the OTP code should contain lower case alphabets.
* @default false
*/
lowerCaseAlphabets?: boolean
/**
* Whether the OTP code should contain upper case alphabets.
* @default true
*/
upperCaseAlphabets?: boolean
/**
* Whether the OTP code should contain special characters.
* @default false
*/
specialChars?: boolean
}
authenticator.use(
new OTPStrategy({
codeGeneration: {
length: 12,
expiresAt: 1000 * 60 * 5, // 5 minutes in milliseconds.
// ... other options.
},
// storeCode: async (code) => {},
// sendCode: async ({ email, ... }) => {},
}),
)
Magic Link Generation
The Magic Link is optional and enabled by default. You can decide to opt-out by setting the enabled
option to false
.
Furthermore, the Magic Link can be customized via the magicLinkGeneration
object in the OTPStrategy instance.
The link generated will be in the format of https://{baseUrl}{callbackPath}?{codeField}=<magic-link-code>
.
/**
* The Magic Link configuration.
*/
export interface MagicLinkGenerationOptions {
/**
* Whether to enable the Magic Link feature.
* @default true
*/
enabled?: boolean
/**
* The base URL for building the Magic Link URL.
* If omitted, the `baseUrl` will be inferred from the request.
* @default undefined
*/
baseUrl?: string
/**
* The path for the Magic Link callback.
* If your provider route name is different than `magic-link`, you can update it on here.
* @default '/magic-link'
*/
callbackPath?: string
}
Note: Just enabling the Magic Link feature is not enough, you will need to also create the
magic-link
route.
Custom Error Messages
You can customize the error messages by passing an object called customErrors
to the OTPStrategy Instance.
This can be useful if you want to translate the error messages to your preferred language, or to give more context to the user.
/**
* The custom errors configuration.
*/
export interface CustomErrorsOptions {
/**
* The error message when the email address is required.
*/
requiredEmail?: string
/**
* The error message when the email address is invalid.
*/
invalidEmail?: string
/**
* The error message when the email address is no longer active.
*/
inactiveCode?: string
/**
* The error message when the OTP code has expired.
*/
expiredCode?: string
/**
* The error message when the OTP code attempts has reached the maximum.
*/
maxCodeAttemptsReached?: string
}
authenticator.use(
new OTPStrategy({
customErrors: {
requiredEmail: 'Custom error message for required email.',
},
// storeCode: async (code) => {},
// sendCode: async ({ email, ... }) => {},
}),
)
More Options
The Strategy supports a few more optional configuration options you can set.
/**
* Declares the Strategy configuration
* needed for the developer to correctly work with.
*/
export interface OTPStrategyOptions<User> {
/**
* A secret string used to encrypt and decrypt the OTP code.
* @default ''
*/
secret?: string
/**
* The form input name used to get the email address.
* @default "email"
*/
emailField?: string
/**
* The form input name used to get the OTP code.
* @default "code"
*/
codeField?: string
/**
* The maximum age of the session in milliseconds. ("Remember Me" feature)
* @default undefined
*/
maxAge?: number
/**
* A Session key that stores the email address.
* @default "auth:email"
*/
sessionEmailKey?: string
/**
* A Session key that stores the encrypted OTP code.
* @default "auth:code"
*/
sessionOtpKey?: string
}
Support
If you find this module useful, support it with a Star ⭐
It helps the repository grow and gives me motivation to keep working on it. Thank you!
Acknowledgments
Big thanks to @w00fz for its amazing implementation of the Magic Link feature!
License
Licensed under the MIT license.