
Security News
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.
@cryptr/cryptr-react
Advanced tools
Cryptr SDK for React Single Page Applications using authentication (SSO, Magic link, password ... )
Current version 2.0.1
//npm
npm install @cryptr/cryptr-react
//npm
yarn add @cryptr/cryptr-react
Here is an example of a configuration that will be necessary to implement our solution
const config = {
audience: process.env.REACT_APP_CRYPTR_AUDIENCE,
cryptr_base_url: process.env.REACT_APP_CRYPTR_BASE_URL,
tenant_domain: process.env.REACT_APP_CRYPTR_TENANT_DOMAIN,
client_id: process.env.REACT_APP_CRYPTR_CLIENT_ID,
default_redirect_uri: process.env.REACT_APP_CRYPTR_DEFAULT_REDIRECT_URI,
dedicated_server: process.env.REACT_APP_CRYPTR_DEDICATED_SERVER == 'true',
default_slo_after_revoke: process.env.REACT_APP_CRYPTR_DEFAULT_SLO_AFTER_REVOKE == 'true',
}
Explanation of config
| key | Required/Optional | type | Default | Description |
|---|---|---|---|---|
tenant_domain | required | string slug | - | Reference to your company entity |
client_id | required | uuid | - | Reference to your front app id |
audience | required | string URL | - | Root URL of your front app |
default_redirect_uri | required | string URL | - | Desired redirection URL after authentication process |
cryptr_base_url | required | string URL | - | URL of your Cryptr service |
default_slo_after_revoke | required(since 1.2.0) | boolean | Defines if SLO has to be done on SSO logout process | |
dedicated_server | Optional | boolean | false | Contact Cryptr Team to set properly |
⚠️ fixed_pkce has been removed in the 1.4.0 release version
After creating your config, create your CryptrProvider that should encapsulate your App content.
Here is a quick sample (also see our sample (src/examples/App.tsx))
import React, { ReactElement } from 'react'
import { BrowserRouter as Router, Route } from 'react-router-dom'
// import from cryptr SDK
import { CryptrProvider } from '@cryptr/cryptr-react'
const config = {/*... your config */}
const AppContainer = (): ReactElement => {
return (
<Router>
// your routes
</Router>
)
}
const App = (): ReactElement => {
<CryptrProvider {...config} >
<AppContainer />
</CryptrProvider>
}
return default App
Then you will be able to handle Cryptr session through our hook and our components
useCryptrOn any React element child of the CryptrProvider you'll be able to use our hook useCryptr for your Cryptr usage.
Here is a quick example
import React, { ReactElement } from 'react'
import { useCryptr } from '@cryptr/cryptr-react'
const MyComponent = (): ReactElement => {
const { isAuthenticated, isLoading } = useCryptr()
if (isLoading) {
return <span>Cryptr is processing authentication</span>
}
if (isAuthenticated()) {
return <span>A Cryptr session is live</span>
} else {
return <span>User is not authenticated</span>
}
}
export default MyComponent
Here is a quick list of tools from our hook
| Name | Purpose |
|---|---|
isLoading | Cryptr SDK is currently looking for a active authentication (after login or refresh) |
isAuthenticated | Cryptr SDK has a live Access token ➡️ a user is logged in |
user | Returns the user objecgt containing all keys from Cryptr ID Token |
logOut | Asks to Cryptr SDK to run the session log out process |
decoratedRequest(axiosConfig: AxiosRequestConfig) | This method based on axios will decorate the request to the desired endpoint with the current Access Token as Authorization Bearer Header |
There are more but the major features are just above
We embedded some components in this SDK to help your integration. Mainly it's button components and can still be configured as you wish (eg: text, className, style ...)
When you either know which is the entity of the user trying to connect or if you prefer to let him type his email on our gateway
import React, { ReactElement } from 'react'
import { SignInWithDomainButton } from '@cryptr/cryptr-react'
const LoginComponent = (): ReactElement => {
return <SignInWithDomainButton domain={'nullable-entity-domain'} />
}
export default LoginComponent
💡
domainis optional if you do not know current user's context
When you already asked the user his email address
import React, { ReactElement } from 'react'
import { SignInWithEmailButton } from '@cryptr/cryptr-react'
const LoginComponent = (): ReactElement => {
return <SignInWithEmailButton email={'not-nullable-john@doe.com'} />
}
export default LoginComponent
Some legacy items have been deleted since 1.3.0. If you need some support for migration contact us
FAQs
Cryptr React Authentication SDK
The npm package @cryptr/cryptr-react receives a total of 33 weekly downloads. As such, @cryptr/cryptr-react popularity was classified as not popular.
We found that @cryptr/cryptr-react demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Multiple high-impact npm maintainers confirm they have been targeted in the same social engineering campaign that compromised Axios.

Security News
Axios compromise traced to social engineering, showing how attacks on maintainers can bypass controls and expose the broader software supply chain.

Security News
Node.js has paused its bug bounty program after funding ended, removing payouts for vulnerability reports but keeping its security process unchanged.