Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

auth0-lock-passwordless

Package Overview
Dependencies
Maintainers
7
Versions
26
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

auth0-lock-passwordless

Auth0 Lock Passwordless

  • 1.0.1
  • Source
  • npm
  • Socket score

Version published
Maintainers
7
Created
Source

Lock Passwordless

NPM version Build status Dependency Status License Downloads

Auth0 Lock Passwordless is a professional looking dialog that allows users to log in by receiving a one-time password via email or text message.

Playground

You can try it out yourself online at the playground.

Usage

The most common scenario would be to open the dialog when the user clicks a login button. In order to do that, you can initialize a new Auth0LockPasswordless object, register an event handler for the click event on the button element, and finally invoke the magiclink method from it.

var clientID = "YOUR_AUTH0_APP_CLIENTID";
var domain = "YOUR_DOMAIN_AT.auth0.com";
var lock = new Auth0LockPasswordless(clientID, domain);
document.getElementById("loginButton").onclick = function(e) {
  lock.magiclink(function() {
    // this will be invoked after an attempt to send an email with a link that
    // will log the user in automatically has been sent to the entered address
  });
};

The magiclink method is only one of the many methods available in Auth0LockPasswordless objects that will display the dialog. Depending on which one you invoke, the behavior of the dialog will be different. Each one of these methods take an optional options argument, which is not being shown in the code snippet above, and a callback function. The options will allow you to customize how the dialog will look, and callback will be invoked when the dialog's job can be considered done. See below the API section for more details.

Install

From CDN

<!-- Latest major release -->
<script src="http://cdn.auth0.com/js/lock-passwordless-1.min.js"></script>

<!-- Latest minor release -->
<script src="http://cdn.auth0.com/js/lock-passwordless-1.0.min.js"></script>

<!-- Latest patch release (recommended for production) -->
<script src="http://cdn.auth0.com/js/lock-passwordless-1.0.1.min.js"></script>

From bower

bower install auth0-lock-passwordless
<script src="bower_components/auth0-lock-passwordless/dist/auth0-lock-passwordless.min.js"></script>

From npm

Auth0LockPasswordless distribution file is built using browserify. By installing via npm you will need to compile it or add it to your own build process.

npm install auth0-lock-passwordless

Browserify will need the following transforms to bundle the auth0-lock-passwordless module:

{
  "devDependencies": {
    "babelify": "^6.1.2",
    "browserify-css": "^0.6.1",
    "packageify": "^0.2.2"
  }
}

And you'll need to configure babelify with the following options:

{
  "blacklist": [
    "regenerator"
  ],
  "optional": [
    "es7.functionBind",
    "es7.objectRestSpread"
  ]
}

Finally, make sure browserify consider files with the .jsx extension as modules. This can be done with the --extension=.jsx option.

If you are targeting mobile audiences, it's recommended that you add:

<meta name="viewport" content="width=device-width, initial-scale=1, maximum-scale=1, user-scalable=0"/>

API

new Auth0LockPasswordless(clientID, domain)

Initializes a new instance of Auth0LockPasswordless configured with your application clientID and your account's domain at Auth0.

  • clientID {String}: Your application clientID in Auth0.
  • domain {String}: Your Auth0 domain. Usually your-account.auth0.com.

You can find this information at your application settings.

Example
var clientID = "YOUR_AUTH0_APP_CLIENTID";
var domain = "YOUR_DOMAIN_AT.auth0.com";
var lock = new Auth0LockPasswordless(clientID, domain);

.magiclink(options, callback)

Opens a dialog that asks the user for an email address. Once entered, it will send an email containing a magic link that allows the user to log in automatically.

  • options {Object}: Allows to customize the dialog's appearance and behavior. See below for the details.
  • callback {Function}: Will be invoked after an attempt to send the the email has been made. In case of success it will receive the entered email address.
Example
// invoke magiclink without options or callback
lock.magiclink();

// invoke magiclink with an option that prevents the user from closing the
// dialog
lock.magiclink({closable: false});

// invoke magiclink with a callback function that displays an alert when the
// email has been sent.
lock.magiclink(function(error, email) {
  if (!error) {
    alert("A magic link has been sent to " + email);
  }
});

// invoke magiclink with options and callback
lock.magiclink({closable: false}, function(error, email) {
  if (!error) {
    alert("A magic link has been sent to " + email);
  }
});

.emailcode(options, callback)

Opens a dialog that asks the user for an email address. Then, it will ask for a code that has been sent in an email to the given address. The code will be used as a one-time password to log in.

  • options {Object}: Allows to customize the dialog's appearance and behavior. See below for the details.
  • callback {Function}: Will be invoked after an attempt to log the user in has been made.
Example
// invoke emailcode without options or callback
lock.emailcode();

// invoke emailcode with an option that prevents the user from closing the
// dialog
lock.emailcode({closable: false});

// invoke emailcode with a callback function that displays an alert when the
// user has logged in.
lock.emailcode(function(error, profile, id_token, access_token, state, refresh_token) {
  if (!error) {
    alert("User has logged in");
  }
});

// invoke emailcode with options and callback
lock.emailcode({closable: false}, function(error, profile, id_token, access_token, state, refresh_token) {
  if (!error) {
    alert("User has logged in");
  }
});

// invoke emailcode in redirect mode
lock.emailcode({callbackURL: "http://mydomain/callback"});

.sms(options, callback)

Opens a dialog that asks the user for a phone number. Then, it will ask for a code that has been sent in an text message to the given number. The code will be used as a one-time password to log in.

  • options {Object}: Allows to customize the dialog's appearance and behavior. See below for the details.
  • callback {Function}: Will be invoked after an attempt to log the user in has been made.
Example
// invoke sms without options or callback
lock.sms();

// invoke sms with an option that prevents the user from closing the dialog
lock.sms({closable: false});

// invoke sms with a callback function that displays an alert when the user has
// logged in.
lock.sms(function(error, profile, id_token, access_token, state, refresh_token) {
  if (!error) {
    alert("User has logged in");
  }
});

// invoke sms with options and callback
lock.sms({closable: false}, function(error, profile, id_token, access_token, state, refresh_token) {
  if (!error) {
    alert("User has logged in");
  }
});

// invoke sms in redirect mode
lock.sms({callbackURL: "http://mydomain/callback"});

.close(callback)

Closes the dialog.

  • callback {Function}: Will be invoked after the lock has been closed with no arguments.
Example
// invoke close without a callback
lock.close();

// invoke close with a callback
lock.close(function() {
  alert("The Lock has been closed");
});

.getProfile(token, callback)

Fetches the full user profile.

  • token {String}: User id token.
  • callback {Function}: Will be invoked after the user profile been retrieved.
Example
lock.getProfile(id_token, function(error, profile) {
  if (!error) {
    alert("hello " + profile.name);
  }
});

.logout(query)

Log out an user.

  • query {String}: Query parameters that will be send with the request to log the user out.

.parseHash(hash)

Parses the hash containing access_token and id_token appended by Auth0 to the URL in redirect mode.

  • hash {string}: Hash appended by Auth0 to the URL in redirect mode.
Example
lock.parseHash(window.location.hash);
Example
// invoke logout without query parameters
lock.logout();

// invoke logout with query parameters
lock.logout({ref: window.location.href});

Customization

The appearance of the widget and the mechanics of authentication can be customized with an options object which has one or more of the following properties. Each method that opens the dialog can take an options object as its first argument.

UI options
  • autoclose {Boolean}: Determines whether or not the Lock will be closed automatically after a successful sign in. If the Lock is not closable it won't be closed even if this option is set to true. Defaults to false.
  • container {String}: The id of the html element where the Lock will be rendered. This makes the Lock appear inline instead of in a modal window.
  • dict {Object}: Allows to customize every piece of text displayed in the Lock. Defaults to {}. See below Dict Specification for the details.
  • icon {String}: Url for an image that will be placed in the Lock's header. Defaults to Auth0's logo.
  • closable {Boolean}: Determines whether or not the Lock can be closed. When a container option is provided its value is always false, otherwise it defaults to true.
  • defaultLocation {String}: ISO country code of the country that will be selected by default when entering a phone number. Defaults to "US".
  • focusInput {Boolean}: Determines whether or not the first input on the screen, that is the email or phone number input, should have focus when the Lock is displayed. Defaults to false when a container option is provided or the Lock is being render on a mobile device. Otherwise it defaults to true.
  • gravatar {Boolean}: Determines whether or not Gravatar images and user names should be displayed on the Lock's header once an email has been entered. Defaults to true.
  • primaryColor {String}: Defines the primary color of the Lock, all colors used in the widget will be calculated from it. This option is useful when providing a custom icon to ensure all colors go well together with the icon's color palette. Defaults to "#ea5323".
  • rememberLastLogin {Boolean}: Determines whether or not the email or the phone number will be filled automatically with the one you used the last time. Defaults to true.
Authentication options
  • authParams {Object}: Specifies extra parameters that will be sent when starting a login. Defaults to {}.
  • callbackURL {String}: The url Auth0 will redirect back after authentication. When provided it will enable redirect mode. Defaults to the empty string "" (no callback URL).
  • forceJSONP {Boolean}: Force JSONP requests for all requests to Auth0. This setup is useful when no CORS allowed. Defaults to false.
  • responseType {String}: Should be set to "token" for Single Page Applications, and "code" otherwise. Defaults to "code" when callbackURL is provided, and to "token" otherwise.
Example
var options = {
  container: "myContainer",
  icon: "/path/to/my/icon.png",
  closable: false,
  dict: {title: "My Company"},
  focusInput: false,
  gravatar: false
};
Dict Specification

A dict, short for dictionary, is an object that contains every piece of text the Lock needs to display. Different textual components are needed depending on what method you called to open the Lock. The following is an example of the dict used when the Lock is opened with the emailcode method:

{
  code: {
    codeInputPlaceholder: "Your code",
    footerText: "",
    headerText: "Please check your email ({email})<br />You've received a message from us<br />with your passcode."
  },
  confirmation: {
    success: "Thanks for signing in."
  },
  email: {
    emailInputPlaceholder: "yours@example.com",
    footerText: "",
    headerText: "Enter your email to sign in or sign up."
  },
  title: "Auth0",
  welcome: "Welcome {name}!"
}

When you open the Lock with emailcode or any other method available, you can override any value by providing a dict option.

lock.emailcode({
  email: {
    footerText: "You must agree to our <a href='/terms' target='_new'>terms of service</a>"
  },
  title: "My Company"
});

The previous code will change the title displayed in the header and will display a footer when the Lock is asking the user for the email.

As you can see from the examples, some keys are namespaced inside another object and some are not. In the first case, they are only used in a given screen, while in the latter can be used from any screen. Also, most of the values accept HTML tags. The exception are the the ones used as input placeholders. Finally, some strings can be interpolated, which means that they contain a placeholder which will be replaced before being displayed. For instance:

lock.emailcode({
  code: {
    headerText: "The code has been sent to {email}"
  }
});

Will cause the Lock to show the message "The code has been sent to someone@auth0.com" when asking for the verification code to a user that entered the email "someone@auth0.com".

You can check the source code to see the actual dictionaries used by the Lock.

Callbacks and Errors

As a rule of thumb, all callbacks passed to a method that opens the Lock are invoked when the job of the Lock can be considered done. The first argument of the callback is reserved for an error object. If an error occurred, the callback will be invoked with just the error object. If no error occurred, the callback will be invoked with null as the first argument, followed by any number of arguments it needs.

All error objects have an error and a description property. The first will contain a synthetic code used to identify the error, and the later will contain a more readable description. They may contain other useful properties according to the situation.

See each method's documentation for the specifics.

Browser Compatibility

We ensure browser compatibility in Chrome, Safari, Firefox and IE >= 10. We currently use zuul along with Saucelabs to run integration tests on each push.

Contributing

Clone the repo and run the following commands:

npm install
npm start

Changes to the source code will be automatically rebuilt. To see the result, point your favorite browser to http://localhost:3000/playground/.

However, testing changes that way can be cumbersome because there are HTTP request involved which are being rate-limited. If your changes are scoped to the UI, you will be better off running:

npm run design

And pointing your browser to http://localhost:3000/design/. It behaves just like npm start but requests to the Auth0 API will be simulated.

Running the tests

Tests can be run in PhantomJS or in a web browser with the following commands:

npm run test:phantom
npm run test:browser

Releasing a new version

Whenever a new commit is pushed to master, the CI will attempt to deploy a new release to Github and npm if the tests pass and there isn't already a release for the version specified in the package.json file. See bin/deploy for the details.

There is also a convenient script to prepare a new release:

bin/version {patch,minor,major}

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

Keywords

FAQs

Package last updated on 30 Sep 2015

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc