
Security News
/Research
Popular node-ipc npm Package Infected with Credential Stealer
Socket detected malicious node-ipc versions with obfuscated stealer/backdoor behavior in a developing npm supply chain attack.
@cryptr/cryptr-spa-js
Advanced tools
Cryptr SDK for Single Page Applications using passwordless authentication and/or SSO
| Statements | Branches | Functions |
|---|---|---|
Cryptr SDK for Single Page Applications using passwordless authentication
current version 2.1.0
⚠️ If you do not have access to your Cryptr dashboard using URL like https://dashboard.your-cryptr-service-url.. please use version 1.4.0
//yarn
yarn add @cryptr/cryptr-spa-js
//npm
npm install @cryptr/cryptr-spa-js
Here is an example of CryptrConfig
var config = {
tenant_domain: 'your-domain',
client_id: 'your-api-key-client-id',
audience: 'http://localhost:8000',
default_redirect_uri: 'http://localhost:8000/',
cryptr_base_url: 'https://your_cryptr_server_url',
dedicated_server: true,
default_slo_after_revoke: false,
}
Explanation of config
| key | Required/Optional | type | Default | Description |
|---|---|---|---|---|
tenant_domain | required | string slug | - | Reference to your company entity |
client_id | required | uuid | - | Reference to your api key client id |
audience | required | string URL | - | Root URL of your front app |
default_redirect_uri | required | string URL | - | Desired redirection URL after authentication process |
cryptr_base_url | required | string URL | - | URL of your Cryptr service |
dedicated_server | Optional | boolean | false | Contact Cryptr Team to set properly |
default_slo_after_revoke | required | boolean | false | Set to trueto always proceed SLO while logging out from an SSO session |
| --- | --- | --- | --- | --- |
⚠️ fixed_pkce has been removed in the 1.4.0 release version
After building your config, create your Cryptr client as below:
this.cryptrClient = await CryptrSpa.createClient(config)
After this creation, a quick script is required, contact our team to get it.
⚠️ Contact us for more info about this section
This is the latest feature of our SDK and our solutions.
The following methods will allow you to open a session either from the email or the domain of the end-user
If you have the email of the end-user you can call the below method, and depending on whether the email matches an organization or an existing account, the user will be guided into to proper login process (sso, magic link, password ..)
// signature
signInWithEmail(email: string, options?: SsoSignOptsAttrs)
// simple call
signInWithEmail('john@doe.com')
// email and options
signInWithEmail('john@doe.com', { locale: 'fr' })
If you have the domain of the end user you can call the below method
// signature
signInWithDomain(organizationDomain?: string, options?: SsoSignOptsAttrs)
// simple call
signInWithDomain('some-organization')
// domain + options
signInWithDomain('some-organization', {locale: 'fr'})
If you would like to let the user type his email on your Cryptr service
// signature
signIn(options?: SsoSignOptsAttrs)
// simple call
signIn()
// call with options
signIn({ locale: 'fr' })
When you want to let the user close its session (either Magic Link or SSO) proceed as follows:
To start the process call logOut(callback, location, targetUrl)
Example:
this.cryptrClient.logOut(() => {
alert('you are logged out')
})
| Attribute | Required/Optional | type | Default | Description |
|---|---|---|---|---|
callback | optional | Function | - | Process to be called after log out process, ⚠️ Only available in Magic link process due to Redirect process in SSO |
location | optional | string URL | window.location | Current location |
targetUrl | optional | string URL | window.location.href | URL after Log out process |
sloAfterRevoke | optional | boolean | config.default_slo_after_revoke | define if SLO has to be processed after session removal |
You can retrieve current user data properties using getUser()
Example:
this.cryptrClient.getUser()
This method will return you a struct with different properties such as email, user ID or organization domain.
For more information please contact us.
Some legacy items have been deleted since 1.3.0. If you need some support for migration contact us
FAQs
Cryptr SDK for Single Page Applications using passwordless authentication and/or SSO
We found that @cryptr/cryptr-spa-js demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
/Research
Socket detected malicious node-ipc versions with obfuscated stealer/backdoor behavior in a developing npm supply chain attack.

Security News
TeamPCP and BreachForums are promoting a Shai-Hulud supply chain attack contest with a $1,000 prize for the biggest package compromise.

Security News
Packagist urges PHP projects to update Composer after a GitHub token format change exposed some GitHub Actions tokens in CI logs.