Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

GoTrueMFAApi

import type { GoTrueMFAApi } from "https://esm.sh/@supabase/supabase-js@2.95.3/dist/index.d.mts";

Contains the full multi-factor authentication API.

interface GoTrueMFAApi {
webauthn: WebAuthnApi;
challenge(params: MFAChallengeParams): Promise<AuthMFAChallengeResponse>;
challengeAndVerify(params: MFAChallengeAndVerifyParams): Promise<AuthMFAVerifyResponse>;
enroll(params: MFAEnrollParams): Promise<AuthMFAEnrollResponse>;
getAuthenticatorAssuranceLevel(jwt?: string): Promise<AuthMFAGetAuthenticatorAssuranceLevelResponse>;
listFactors(): Promise<AuthMFAListFactorsResponse>;
unenroll(params: MFAUnenrollParams): Promise<AuthMFAUnenrollResponse>;
verify(params: MFAVerifyTOTPParams): Promise<AuthMFAVerifyResponse>;
verify(params: MFAVerifyPhoneParams): Promise<AuthMFAVerifyResponse>;
verify(params: MFAVerifyParams): Promise<AuthMFAVerifyResponse>;
}

§Properties

§Methods

§

Prepares a challenge used to verify that a user has access to a MFA factor.

§
challengeAndVerify(params: MFAChallengeAndVerifyParams): Promise<AuthMFAVerifyResponse>
[src]

Helper method which creates a challenge and immediately uses the given code to verify against it thereafter. The verification code is provided by the user by entering a code seen in their authenticator app.

§

Starts the enrollment process for a new Multi-Factor Authentication (MFA) factor. This method creates a new unverified factor. To verify a factor, present the QR code or secret to the user and ask them to add it to their authenticator app. The user has to enter the code from their authenticator app to verify it.

Upon verifying a factor, all other sessions are logged out and the current session's authenticator level is promoted to aal2.

§
getAuthenticatorAssuranceLevel(jwt?: string): Promise<AuthMFAGetAuthenticatorAssuranceLevelResponse>
[src]

Returns the Authenticator Assurance Level (AAL) for the active session.

  • aal1 (or null) means that the user's identity has been verified only with a conventional login (email+password, OTP, magic link, social login, etc.).
  • aal2 means that the user's identity has been verified both with a conventional login and at least one MFA factor.

When called without a JWT parameter, this method is fairly quick (microseconds) and rarely uses the network. When a JWT is provided (useful in server-side environments like Edge Functions where no session is stored), this method will make a network request to validate the user and fetch their MFA factors.

@param jwt

Takes in an optional access token JWT. If no JWT is provided, the JWT from the current session is used.

§
listFactors(): Promise<AuthMFAListFactorsResponse>
[src]

Returns the list of MFA factors enabled for this user.

§

Unenroll removes a MFA factor. A user has to have an aal2 authenticator level in order to unenroll a verified factor.

§

Verifies a code against a challenge. The verification code is provided by the user by entering a code seen in their authenticator app.