JavaScript Client Library
@supabase/supabase-jsView on GitHubThis reference documents every object and method available in Supabase's isomorphic JavaScript library, supabase-js
. You can use supabase-js
to interact with your Postgres database, listen to database changes, invoke Deno Edge Functions, build login and user management functionality, and manage large files.
To convert SQL queries to supabase-js
calls, use the SQL to REST API translator.
Installing
Install as package
You can install @supabase/supabase-js via the terminal.
1npm install @supabase/supabase-js
Install via CDN
You can install @supabase/supabase-js via CDN links.
123<script src="https://cdn.jsdelivr.net/npm/@supabase/supabase-js@2"></script>//or<script src="https://unpkg.com/@supabase/supabase-js@2"></script>
Use at runtime in Deno
You can use supabase-js in the Deno runtime via JSR:
1import { createClient } from 'npm:@supabase/supabase-js@2'
Initializing
Create a new client for use in the browser.
You can initialize a new Supabase client using the createClient()
method.
The Supabase client is your entrypoint to the rest of the Supabase functionality and is the easiest way to interact with everything we offer within the Supabase ecosystem.
Parameters
- supabaseUrlRequiredstring
The unique Supabase URL which is supplied when you create a new project in your project dashboard.
- supabaseKeyRequiredstring
The unique Supabase Key which is supplied when you create a new project in your project dashboard.
- optionsOptionalSupabaseClientOptions
1234import { createClient } from '@supabase/supabase-js'// Create a single supabase client for interacting with your databaseconst supabase = createClient('https://xyzcompany.supabase.co', 'publishable-or-anon-key')
TypeScript support
supabase-js
has TypeScript support for type inference, autocompletion, type-safe queries, and more.
With TypeScript, supabase-js
detects things like not null
constraints and generated columns. Nullable columns are typed as T | null
when you select the column. Generated columns will show a type error when you insert to it.
supabase-js
also detects relationships between tables. A referenced table with one-to-many relationship is typed as T[]
. Likewise, a referenced table with many-to-one relationship is typed as T | null
.
Generating TypeScript Types
You can use the Supabase CLI to generate the types. You can also generate the types from the dashboard.
1supabase gen types typescript --project-id abcdefghijklmnopqrst > database.types.ts
These types are generated from your database schema. Given a table public.movies
, the generated types will look like:
12345create table public.movies ( id bigint generated always as identity primary key, name text not null, data jsonb null);
12345678910111213141516171819202122232425export type Json = string | number | boolean | null | { [key: string]: Json | undefined } | Json[]export interface Database { public: { Tables: { movies: { Row: { // the data expected from .select() id: number name: string data: Json | null } Insert: { // the data to be passed to .insert() id?: never // generated columns must not be supplied name: string // `not null` columns with no default must be supplied data?: Json | null // nullable columns can be omitted } Update: { // the data to be passed to .update() id?: never name?: string // `not null` columns are optional on .update() data?: Json | null } } } }}
Using TypeScript type definitions
You can supply the type definitions to supabase-js
like so:
1234567import { createClient } from '@supabase/supabase-js'import { Database } from './database.types'const supabase = createClient<Database>( process.env.SUPABASE_URL, process.env.SUPABASE_ANON_KEY)
Helper types for Tables and Joins
You can use the following helper types to make the generated TypeScript types easier to use.
Sometimes the generated types are not what you expect. For example, a view's column may show up as nullable when you expect it to be not null
. Using type-fest, you can override the types like so:
12345export type Json = // ...export interface Database { // ...}
1234567891011121314151617181920import { MergeDeep } from 'type-fest'import { Database as DatabaseGenerated } from './database-generated.types'export { Json } from './database-generated.types'// Override the type for a specific column in a view:export type Database = MergeDeep< DatabaseGenerated, { public: { Views: { movies_view: { Row: { // id is a primary key in public.movies, so it must be `not null` id: number } } } } }>
You can also override the type of an individual successful response if needed:
123456789// Partial type override allows you to only override some of the properties in your resultsconst { data } = await supabase.from('countries').select().overrideTypes<Array<{ id: string }>>()// For a full replacement of the original return type use the `{ merge: false }` property as second argumentconst { data } = await supabase .from('countries') .select() .overrideTypes<Array<{ id: string }>, { merge: false }>()// Use it with `maybeSingle` or `single`const { data } = await supabase.from('countries').select().single().overrideTypes<{ id: string }>()
The generated types provide shorthands for accessing tables and enums.
1234567import { Database, Tables, Enums } from "./database.types.ts";// Before đlet movie: Database['public']['Tables']['movies']['Row'] = // ...// After đlet movie: Tables<'movies'>
Response types for complex queries
supabase-js
always returns a data
object (for success), and an error
object (for unsuccessful requests).
These helper types provide the result types from any query, including nested types for database joins.
Given the following schema with a relation between cities and countries, we can get the nested CountriesWithCities
type:
12345678910create table countries ( "id" serial primary key, "name" text);create table cities ( "id" serial primary key, "name" text, "country_id" int references "countries");
1234567891011121314151617import { QueryResult, QueryData, QueryError } from '@supabase/supabase-js'const countriesWithCitiesQuery = supabase .from("countries") .select(` id, name, cities ( id, name ) `);type CountriesWithCities = QueryData<typeof countriesWithCitiesQuery>;const { data, error } = await countriesWithCitiesQuery;if (error) throw error;const countriesWithCities: CountriesWithCities = data;
Fetch data
Perform a SELECT query on the table or view.
- By default, Supabase projects return a maximum of 1,000 rows. This setting can be changed in your project's API settings. It's recommended that you keep it low to limit the payload size of accidental or malicious requests. You can use
range()
queries to paginate through your data. select()
can be combined with Filtersselect()
can be combined with Modifiersapikey
is a reserved keyword if you're using the Supabase Platform and should be avoided as a column name.
Parameters
- columnsOptionalQuery
The columns to retrieve, separated by commas. Columns can be renamed when returned with
customName:columnName
- optionsRequiredobject
Named parameters
123const { data, error } = await supabase .from('characters') .select()
Insert data
Perform an INSERT into the table or view.
By default, inserted rows are not returned. To return it, chain the call with .select()
.
Parameters
- valuesRequiredOne of the following options
The values to insert. Pass an object to insert a single row or an array to insert multiple rows.
- Option 1Row
- Option 2Array<Row>
- optionsOptionalobject
Named parameters
123const { error } = await supabase .from('countries') .insert({ id: 1, name: 'Mordor' })
Update data
Perform an UPDATE on the table or view.
By default, updated rows are not returned. To return it, chain the call with .select()
after filters.
update()
should always be combined with Filters to target the item(s) you wish to update.
Parameters
- valuesRequiredRow
The values to update with
- optionsRequiredobject
Named parameters
1234const { error } = await supabase .from('instruments') .update({ name: 'piano' }) .eq('id', 1)
Upsert data
Perform an UPSERT on the table or view. Depending on the column(s) passed to onConflict
, .upsert()
allows you to perform the equivalent of .insert()
if a row with the corresponding onConflict
columns doesn't exist, or if it does exist, perform an alternative action depending on ignoreDuplicates
.
By default, upserted rows are not returned. To return it, chain the call with .select()
.
- Primary keys must be included in
values
to use upsert.
Parameters
- valuesRequiredOne of the following options
The values to upsert with. Pass an object to upsert a single row or an array to upsert multiple rows.
- Option 1Row
- Option 2Array<Row>
- optionsOptionalobject
Named parameters
1234const { data, error } = await supabase .from('instruments') .upsert({ id: 1, name: 'piano' }) .select()
Delete data
Perform a DELETE on the table or view.
By default, deleted rows are not returned. To return it, chain the call with .select()
after filters.
delete()
should always be combined with filters to target the item(s) you wish to delete.- If you use
delete()
with filters and you have RLS enabled, only rows visible throughSELECT
policies are deleted. Note that by default no rows are visible, so you need at least oneSELECT
/ALL
policy that makes the rows visible. - When using
delete().in()
, specify an array of values to target multiple rows with a single query. This is particularly useful for batch deleting entries that share common criteria, such as deleting users by their IDs. Ensure that the array you provide accurately represents all records you intend to delete to avoid unintended data removal.
Parameters
- optionsRequiredobject
Named parameters
1234const response = await supabase .from('countries') .delete() .eq('id', 1)
Call a Postgres function
Perform a function call.
You can call Postgres functions as Remote Procedure Calls, logic in your database that you can execute from anywhere. Functions are useful when the logic rarely changesâlike for password resets and updates.
123create or replace function hello_world() returns text as $$ select 'Hello world';$$ language sql;
To call Postgres functions on Read Replicas, use the get: true
option.
Parameters
- fnRequiredFnName
The function name to call
- argsRequiredFn['Args']
The arguments to pass to the function call
- optionsRequiredobject
Named parameters
1const { data, error } = await supabase.rpc('hello_world')
Using filters
Filters allow you to only return rows that match certain conditions.
Filters can be used on select()
, update()
, upsert()
, and delete()
queries.
If a Postgres function returns a table response, you can also apply filters.
123456789const { data, error } = await supabase .from('instruments') .select('name, section_id') .eq('name', 'violin') // Correctconst { data, error } = await supabase .from('instruments') .eq('name', 'violin') // Incorrect .select('name, section_id')
Column is equal to a value
Match only rows where column
is equal to value
.
To check if the value of column
is NULL, you should use .is()
instead.
Parameters
- columnRequiredColumnName
The column to filter on
- valueRequired
The value to filter with
1234const { data, error } = await supabase .from('characters') .select() .eq('name', 'Leia')
Column is not equal to a value
Match only rows where column
is not equal to value
.
Parameters
- columnRequiredColumnName
The column to filter on
- valueRequired
The value to filter with
1234const { data, error } = await supabase .from('characters') .select() .neq('name', 'Leia')
Column is greater than a value
Match only rows where column
is greater than value
.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The value to filter with
- Option 1Row['ColumnName']
- Option 2unknown
1234const { data, error } = await supabase .from('characters') .select() .gt('id', 2)
Column is greater than or equal to a value
Match only rows where column
is greater than or equal to value
.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The value to filter with
- Option 1Row['ColumnName']
- Option 2unknown
1234const { data, error } = await supabase .from('characters') .select() .gte('id', 2)
Column is less than a value
Match only rows where column
is less than value
.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The value to filter with
- Option 1Row['ColumnName']
- Option 2unknown
1234const { data, error } = await supabase .from('characters') .select() .lt('id', 2)
Column is less than or equal to a value
Match only rows where column
is less than or equal to value
.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The value to filter with
- Option 1Row['ColumnName']
- Option 2unknown
1234const { data, error } = await supabase .from('characters') .select() .lte('id', 2)
Column matches a pattern
Match only rows where column
matches pattern
case-sensitively.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- patternRequiredstring
The pattern to match with
1234const { data, error } = await supabase .from('characters') .select() .like('name', '%Lu%')
Column matches a case-insensitive pattern
Match only rows where column
matches pattern
case-insensitively.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- patternRequiredstring
The pattern to match with
1234const { data, error } = await supabase .from('characters') .select() .ilike('name', '%lu%')
Column is a value
Match only rows where column
IS value
.
For non-boolean columns, this is only relevant for checking if the value of column
is NULL by setting value
to null
.
For boolean columns, you can also set value
to true
or false
and it will behave the same way as .eq()
.
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredObject
The value to filter with
1234const { data, error } = await supabase .from('countries') .select() .is('name', null)
Column is in an array
Match only rows where column
is included in the values
array.
Parameters
- columnRequiredColumnName
The column to filter on
- valuesRequiredArray
The values array to filter with
1234const { data, error } = await supabase .from('characters') .select() .in('name', ['Leia', 'Han'])
Column contains every element in a value
Only relevant for jsonb, array, and range columns. Match only rows where column
contains every element appearing in value
.
Parameters
- columnRequiredOne of the following options
The jsonb, array, or range column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The jsonb, array, or range value to filter with
- Option 1string
- Option 2Record<string, unknown>
- Option 3Array<Row['ColumnName']>
- Option 4Array<unknown>
1234const { data, error } = await supabase .from('issues') .select() .contains('tags', ['is:open', 'priority:low'])
Contained by value
Only relevant for jsonb, array, and range columns. Match only rows where every element appearing in column
is contained by value
.
Parameters
- columnRequiredOne of the following options
The jsonb, array, or range column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The jsonb, array, or range value to filter with
- Option 1string
- Option 2Record<string, unknown>
- Option 3Array<Row['ColumnName']>
- Option 4Array<unknown>
1234const { data, error } = await supabase .from('classes') .select('name') .containedBy('days', ['monday', 'tuesday', 'wednesday', 'friday'])
Greater than a range
Only relevant for range columns. Match only rows where every element in column
is greater than any element in range
.
Parameters
- columnRequiredOne of the following options
The range column to filter on
- Option 1ColumnName
- Option 2string
- rangeRequiredstring
The range to filter with
1234const { data, error } = await supabase .from('reservations') .select() .rangeGt('during', '[2000-01-02 08:00, 2000-01-02 09:00)')
Greater than or equal to a range
Only relevant for range columns. Match only rows where every element in column
is either contained in range
or greater than any element in range
.
Parameters
- columnRequiredOne of the following options
The range column to filter on
- Option 1ColumnName
- Option 2string
- rangeRequiredstring
The range to filter with
1234const { data, error } = await supabase .from('reservations') .select() .rangeGte('during', '[2000-01-02 08:30, 2000-01-02 09:30)')
Less than a range
Only relevant for range columns. Match only rows where every element in column
is less than any element in range
.
Parameters
- columnRequiredOne of the following options
The range column to filter on
- Option 1ColumnName
- Option 2string
- rangeRequiredstring
The range to filter with
1234const { data, error } = await supabase .from('reservations') .select() .rangeLt('during', '[2000-01-01 15:00, 2000-01-01 16:00)')
Less than or equal to a range
Only relevant for range columns. Match only rows where every element in column
is either contained in range
or less than any element in range
.
Parameters
- columnRequiredOne of the following options
The range column to filter on
- Option 1ColumnName
- Option 2string
- rangeRequiredstring
The range to filter with
1234const { data, error } = await supabase .from('reservations') .select() .rangeLte('during', '[2000-01-01 14:00, 2000-01-01 16:00)')
Mutually exclusive to a range
Only relevant for range columns. Match only rows where column
is mutually exclusive to range
and there can be no element between the two ranges.
Parameters
- columnRequiredOne of the following options
The range column to filter on
- Option 1ColumnName
- Option 2string
- rangeRequiredstring
The range to filter with
1234const { data, error } = await supabase .from('reservations') .select() .rangeAdjacent('during', '[2000-01-01 12:00, 2000-01-01 13:00)')
With a common element
Only relevant for array and range columns. Match only rows where column
and value
have an element in common.
Parameters
- columnRequiredOne of the following options
The array or range column to filter on
- Option 1ColumnName
- Option 2string
- valueRequiredOne of the following options
The array or range value to filter with
- Option 1string
- Option 2Array<Row['ColumnName']>
- Option 3Array<unknown>
1234const { data, error } = await supabase .from('issues') .select('title') .overlaps('tags', ['is:closed', 'severity:high'])
Match a string
Only relevant for text and tsvector columns. Match only rows where column
matches the query string in query
.
- For more information, see Postgres full text search.
Parameters
- columnRequiredOne of the following options
The text or tsvector column to filter on
- Option 1ColumnName
- Option 2string
- queryRequiredstring
The query text to match with
- optionsOptionalobject
Named parameters
123456const result = await supabase .from("texts") .select("content") .textSearch("content", `'eggs' & 'ham'`, { config: "english", });
Match an associated value
Match only rows where each column in query
keys is equal to its associated value. Shorthand for multiple .eq()
s.
Parameters
- queryRequiredOne of the following options
The object to filter with, with column names as keys mapped to their filter values
- Option 1Record<ColumnName, Row['ColumnName']>
- Option 2Record<string, unknown>
1234const { data, error } = await supabase .from('characters') .select('name') .match({ id: 2, name: 'Leia' })
Don't match the filter
Match only rows which doesn't satisfy the filter.
Unlike most filters, opearator
and value
are used as-is and need to follow PostgREST syntax. You also need to make sure they are properly sanitized.
not() expects you to use the raw PostgREST syntax for the filter values.
12.not('id', 'in', '(5,6,7)') // Use `()` for `in` filter.not('arraycol', 'cs', '{"a","b"}') // Use `cs` for `contains()`, `{}` for array values
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- operatorRequiredOne of the following options
The operator to be negated to filter with, following PostgREST syntax
- Option 1FilterOperator
- Option 2string
- valueRequiredOne of the following options
The value to filter with, following PostgREST syntax
- Option 1Row['ColumnName']
- Option 2unknown
1234const { data, error } = await supabase .from('countries') .select() .not('name', 'is', null)
Match at least one filter
Match only rows which satisfy at least one of the filters.
Unlike most filters, filters
is used as-is and needs to follow PostgREST syntax. You also need to make sure it's properly sanitized.
It's currently not possible to do an .or()
filter across multiple tables.
or() expects you to use the raw PostgREST syntax for the filter names and values.
12.or('id.in.(5,6,7), arraycol.cs.{"a","b"}') // Use `()` for `in` filter, `{}` for array values and `cs` for `contains()`..or('id.in.(5,6,7), arraycol.cd.{"a","b"}') // Use `cd` for `containedBy()`
Parameters
- filtersRequiredstring
The filters to use, following PostgREST syntax
- optionsRequiredobject
Named parameters
1234const { data, error } = await supabase .from('characters') .select('name') .or('id.eq.2,name.eq.Han')
Match the filter
Match only rows which satisfy the filter. This is an escape hatch - you should use the specific filter methods wherever possible.
Unlike most filters, opearator
and value
are used as-is and need to follow PostgREST syntax. You also need to make sure they are properly sanitized.
filter() expects you to use the raw PostgREST syntax for the filter values.
12.filter('id', 'in', '(5,6,7)') // Use `()` for `in` filter.filter('arraycol', 'cs', '{"a","b"}') // Use `cs` for `contains()`, `{}` for array values
Parameters
- columnRequiredOne of the following options
The column to filter on
- Option 1ColumnName
- Option 2string
- operatorRequiredOne of the following options
The operator to filter with, following PostgREST syntax
- Option 1FilterOperator
- Option 2"not.eq"
- Option 3"not.neq"
- Option 4"not.gt"
- Option 5"not.gte"
- Option 6"not.lt"
- Option 7"not.lte"
- Option 8"not.like"
- Option 9"not.ilike"
- Option 10"not.is"
- Option 11"not.in"
- Option 12"not.cs"
- Option 13"not.cd"
- Option 14"not.sl"
- Option 15"not.sr"
- Option 16"not.nxl"
- Option 17"not.nxr"
- Option 18"not.adj"
- Option 19"not.ov"
- Option 20"not.fts"
- Option 21"not.plfts"
- Option 22"not.phfts"
- Option 23"not.wfts"
- Option 24string
- valueRequiredunknown
The value to filter with, following PostgREST syntax
1234const { data, error } = await supabase .from('characters') .select() .filter('name', 'in', '("Han","Yoda")')
Using modifiers
Filters work on the row levelâthey allow you to return rows that only match certain conditions without changing the shape of the rows. Modifiers are everything that don't fit that definitionâallowing you to change the format of the response (e.g., returning a CSV string).
Modifiers must be specified after filters. Some modifiers only apply for queries that return rows (e.g., select()
or rpc()
on a function that returns a table response).
Return data after inserting
Perform a SELECT on the query result.
By default, .insert()
, .update()
, .upsert()
, and .delete()
do not return modified rows. By calling this method, modified rows are returned in data
.
Parameters
- columnsOptionalQuery
The columns to retrieve, separated by commas
1234const { data, error } = await supabase .from('characters') .upsert({ id: 1, name: 'Han Solo' }) .select()
Order the results
Order the query result by column
.
You can call this method multiple times to order by multiple columns.
You can order referenced tables, but it only affects the ordering of the parent table if you use !inner
in the query.
Parameters
- columnRequiredOne of the following options
The column to order by
- Option 1ColumnName
- Option 2string
- optionsOptionalobject
Named parameters
1234const { data, error } = await supabase .from('characters') .select('id, name') .order('id', { ascending: false })
Limit the number of rows returned
Limit the query result by count
.
Parameters
- countRequirednumber
The maximum number of rows to return
- optionsRequiredobject
Named parameters
1234const { data, error } = await supabase .from('characters') .select('name') .limit(1)
Limit the query to a range
Limit the query result by starting at an offset from
and ending at the offset to
. Only records within this range are returned. This respects the query order and if there is no order clause the range could behave unexpectedly. The from
and to
values are 0-based and inclusive: range(1, 3)
will include the second, third and fourth rows of the query.
Parameters
- fromRequirednumber
The starting index from which to limit the result
- toRequirednumber
The last index to which to limit the result
- optionsRequiredobject
Named parameters
1234const { data, error } = await supabase .from('countries') .select('name') .range(0, 1)
Set an abort signal
Set the AbortSignal for the fetch request.
You can use this to set a timeout for the request.
Parameters
- signalRequiredAbortSignal
The AbortSignal to use for the fetch request
123456const ac = new AbortController()ac.abort()const { data, error } = await supabase .from('very_big_table') .select() .abortSignal(ac.signal)
Retrieve one row of data
Return data
as a single object instead of an array of objects.
Query result must be one row (e.g. using .limit(1)
), otherwise this returns an error.
12345const { data, error } = await supabase .from('characters') .select('name') .limit(1) .single()
Retrieve zero or one row of data
Return data
as a single object instead of an array of objects.
Query result must be zero or one row (e.g. using .limit(1)
), otherwise this returns an error.
12345const { data, error } = await supabase .from('characters') .select() .eq('name', 'Katniss') .maybeSingle()
Retrieve as a CSV
Return data
as a string in CSV format.
1234const { data, error } = await supabase .from('characters') .select() .csv()
Override type of successful response
Override the type of the returned data
.
- Deprecated: use overrideTypes method instead
1234const { data } = await supabase .from('countries') .select() .returns<Array<MyType>>()
Partially override or replace type of successful response
Override the type of the returned data
field in the response.
1234const { data } = await supabase .from('countries') .select() .overrideTypes<Array<MyType>, { merge: false }>()
Using explain
Return data
as the EXPLAIN plan for the query.
You need to enable the db_plan_enabled setting before using this method.
For debugging slow queries, you can get the Postgres EXPLAIN
execution plan of a query using the explain()
method. This works on any query, even for rpc()
or writes.
Explain is not enabled by default as it can reveal sensitive information about your database. It's best to only enable this for testing environments but if you wish to enable it for production you can provide additional protection by using a pre-request
function.
Follow the Performance Debugging Guide to enable the functionality on your project.
Parameters
- optionsRequiredobject
Named parameters
Return Type
- Option 1ClientOptions
- Option 2ClientOptions
1234const { data, error } = await supabase .from('characters') .select() .explain()
Overview
-
The auth methods can be accessed via the
supabase.auth
namespace. -
By default, the supabase client sets
persistSession
to true and attempts to store the session in local storage. When using the supabase client in an environment that doesn't support local storage, you might notice the following warning message being logged:No storage option exists to persist the session, which may result in unexpected behavior when using auth. If you want to set
persistSession
to true, please provide a storage option or you may setpersistSession
to false to disable this warning.This warning message can be safely ignored if you're not using auth on the server-side. If you are using auth and you want to set
persistSession
to true, you will need to provide a custom storage implementation that follows this interface. -
Any email links and one-time passwords (OTPs) sent have a default expiry of 24 hours. We have the following rate limits in place to guard against brute force attacks.
-
The expiry of an access token can be set in the "JWT expiry limit" field in your project's auth settings. A refresh token never expires and can only be used once.
123import { createClient } from '@supabase/supabase-js'const supabase = createClient(supabase_url, anon_key)
Create a new user
Creates a new user.
Be aware that if a user account exists in the system you may get back an error message that attempts to hide this information from the user. This method has support for PKCE via email signups. The PKCE flow cannot be used when autoconfirm is enabled.
- By default, the user needs to verify their email address before logging in. To turn this off, disable Confirm email in your project.
- Confirm email determines if users need to confirm their email address after signing up.
- If Confirm email is enabled, a
user
is returned butsession
is null. - If Confirm email is disabled, both a
user
and asession
are returned.
- If Confirm email is enabled, a
- When the user confirms their email address, they are redirected to the
SITE_URL
by default. You can modify yourSITE_URL
or add additional redirect URLs in your project. - If signUp() is called for an existing confirmed user:
- When both Confirm email and Confirm phone (even when phone provider is disabled) are enabled in your project, an obfuscated/fake user object is returned.
- When either Confirm email or Confirm phone (even when phone provider is disabled) is disabled, the error message,
User already registered
is returned.
- To fetch the currently logged-in user, refer to
getUser()
.
Parameters
- credentialsRequiredOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.signUp({ email: 'example@email.com', password: 'example-password',})
Listen to auth events
Receive a notification every time an auth event happens.
- Subscribes to important events occurring on the user's session.
- Use on the frontend/client. It is less useful on the server.
- Events are emitted across tabs to keep your application's UI up-to-date. Some events can fire very frequently, based on the number of tabs open. Use a quick and efficient callback function, and defer or debounce as many operations as you can to be performed outside of the callback.
- Important: A callback can be an
async
function and it runs synchronously during the processing of the changes causing the event. You can easily create a dead-lock by usingawait
on a call to another method of the Supabase library.- Avoid using
async
functions as callbacks. - Limit the number of
await
calls inasync
callbacks. - Do not use other Supabase functions in the callback function. If you must, dispatch the functions once the callback has finished executing. Use this as a quick way to achieve this:
123456supabase.auth.onAuthStateChange((event, session) => { setTimeout(async () => { // await on other Supabase function here // this runs right after the callback has finished }, 0)})
- Avoid using
- Emitted events:
INITIAL_SESSION
- Emitted right after the Supabase client is constructed and the initial session from storage is loaded.
SIGNED_IN
- Emitted each time a user session is confirmed or re-established, including on user sign in and when refocusing a tab.
- Avoid making assumptions as to when this event is fired, this may occur even when the user is already signed in. Instead, check the user object attached to the event to see if a new user has signed in and update your application's UI.
- This event can fire very frequently depending on the number of tabs open in your application.
SIGNED_OUT
- Emitted when the user signs out. This can be after:
- A call to
supabase.auth.signOut()
. - After the user's session has expired for any reason:
- User has signed out on another device.
- The session has reached its timebox limit or inactivity timeout.
- User has signed in on another device with single session per user enabled.
- Check the User Sessions docs for more information.
- A call to
- Use this to clean up any local storage your application has associated with the user.
- Emitted when the user signs out. This can be after:
TOKEN_REFRESHED
- Emitted each time a new access and refresh token are fetched for the signed in user.
- It's best practice and highly recommended to extract the access token (JWT) and store it in memory for further use in your application.
- Avoid frequent calls to
supabase.auth.getSession()
for the same purpose.
- Avoid frequent calls to
- There is a background process that keeps track of when the session should be refreshed so you will always receive valid tokens by listening to this event.
- The frequency of this event is related to the JWT expiry limit configured on your project.
USER_UPDATED
- Emitted each time the
supabase.auth.updateUser()
method finishes successfully. Listen to it to update your application's UI based on new profile information.
- Emitted each time the
PASSWORD_RECOVERY
- Emitted instead of the
SIGNED_IN
event when the user lands on a page that includes a password recovery link in the URL. - Use it to show a UI to the user where they can reset their password.
- Emitted instead of the
Parameters
- callbackRequiredfunction
A callback function to be invoked when an auth event happens.
Return Type
1234567891011121314151617181920const { data } = supabase.auth.onAuthStateChange((event, session) => { console.log(event, session) if (event === 'INITIAL_SESSION') { // handle initial session } else if (event === 'SIGNED_IN') { // handle sign in event } else if (event === 'SIGNED_OUT') { // handle sign out event } else if (event === 'PASSWORD_RECOVERY') { // handle password recovery event } else if (event === 'TOKEN_REFRESHED') { // handle token refreshed event } else if (event === 'USER_UPDATED') { // handle user updated event }})// call unsubscribe to remove the callbackdata.subscription.unsubscribe()
Create an anonymous user
Creates a new anonymous user.
- Returns an anonymous user
- It is recommended to set up captcha for anonymous sign-ins to prevent abuse. You can pass in the captcha token in the
options
param.
Parameters
- credentialsOptionalSignInAnonymouslyCredentials
Return Type
- Option 1object
- Option 2object
12345const { data, error } = await supabase.auth.signInAnonymously({ options: { captchaToken }});
Sign in a user
Log in an existing user with an email and password or phone and password.
Be aware that you may get back an error message that will not distinguish between the cases where the account does not exist or that the email/phone and password combination is wrong or that the account can only be accessed via social login.
- Requires either an email and password or a phone number and password.
Parameters
- credentialsRequiredOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.signInWithPassword({ email: 'example@email.com', password: 'example-password',})
Sign in with ID token (native sign-in)
Allows signing in with an OIDC ID token. The authentication provider used should be enabled and configured.
- Use an ID token to sign in.
- Especially useful when implementing sign in using native platform dialogs in mobile or desktop apps using Sign in with Apple or Sign in with Google on iOS and Android.
- You can also use Google's One Tap and Automatic sign-in via this API.
Parameters
- credentialsRequiredSignInWithIdTokenCredentials
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.signInWithIdToken({ provider: 'google', token: 'your-id-token'})
Sign in a user through OTP
Log in a user using magiclink or a one-time password (OTP).
If the {{ .ConfirmationURL }}
variable is specified in the email template, a magiclink will be sent. If the {{ .Token }}
variable is specified in the email template, an OTP will be sent. If you're using phone sign-ins, only an OTP will be sent. You won't be able to send a magiclink for phone sign-ins.
Be aware that you may get back an error message that will not distinguish between the cases where the account does not exist or, that the account can only be accessed via social login.
Do note that you will need to configure a Whatsapp sender on Twilio if you are using phone sign in with the 'whatsapp' channel. The whatsapp channel is not supported on other providers at this time. This method supports PKCE when an email is passed.
- Requires either an email or phone number.
- This method is used for passwordless sign-ins where a OTP is sent to the user's email or phone number.
- If the user doesn't exist,
signInWithOtp()
will signup the user instead. To restrict this behavior, you can setshouldCreateUser
inSignInWithPasswordlessCredentials.options
tofalse
. - If you're using an email, you can configure whether you want the user to receive a magiclink or a OTP.
- If you're using phone, you can configure whether you want the user to receive a OTP.
- The magic link's destination URL is determined by the
SITE_URL
. - See redirect URLs and wildcards to add additional redirect URLs to your project.
- Magic links and OTPs share the same implementation. To send users a one-time code instead of a magic link, modify the magic link email template to include
{{ .Token }}
instead of{{ .ConfirmationURL }}
. - See our Twilio Phone Auth Guide for details about configuring WhatsApp sign in.
Parameters
- credentialsRequiredOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
123456const { data, error } = await supabase.auth.signInWithOtp({ email: 'example@email.com', options: { emailRedirectTo: 'https://example.com/welcome' }})
Sign in a user through OAuth
Log in an existing user via a third-party provider. This method supports the PKCE flow.
- This method is used for signing in using Social Login (OAuth) providers.
- It works by redirecting your application to the provider's authorization screen, before bringing back the user to your app.
Parameters
- credentialsRequiredSignInWithOAuthCredentials
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.signInWithOAuth({ provider: 'github'})
Sign in a user through SSO
Attempts a single-sign on using an enterprise Identity Provider. A successful SSO attempt will redirect the current page to the identity provider authorization page. The redirect URL is implementation and SSO protocol specific.
You can use it by providing a SSO domain. Typically you can extract this domain by asking users for their email address. If this domain is registered on the Auth instance the redirect will use that organization's currently active SSO Identity Provider for the login.
If you have built an organization-specific login page, you can use the organization's SSO Identity Provider UUID directly instead.
- Before you can call this method you need to establish a connection to an identity provider. Use the CLI commands to do this.
- If you've associated an email domain to the identity provider, you can use the
domain
property to start a sign-in flow. - In case you need to use a different way to start the authentication flow with an identity provider, you can use the
providerId
property. For example:- Mapping specific user email addresses with an identity provider.
- Using different hints to identity the identity provider to be used by the user, like a company-specific page, IP address or other tracking information.
Parameters
- paramsRequiredOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1234567891011// You can extract the user's email domain and use it to trigger the // authentication flow with the correct identity provider. const { data, error } = await supabase.auth.signInWithSSO({ domain: 'company.com' }) if (data?.url) { // redirect the user to the identity provider's authentication flow window.location.href = data.url }
Sign in a user through Web3 (Solana, Ethereum)
Signs in a user by verifying a message signed by the user's private key. Supports Ethereum (via Sign-In-With-Ethereum) & Solana (Sign-In-With-Solana) standards, both of which derive from the EIP-4361 standard With slight variation on Solana's side.
- Uses a Web3 (Ethereum, Solana) wallet to sign a user in.
- Read up on the potential for abuse before using it.
Parameters
- credentialsRequiredOne of the following options
- Option 1One of the following options
- Option 1object
- Option 2object
- Option 2One of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1234567891011// uses window.ethereum for the wallet const { data, error } = await supabase.auth.signInWithWeb3({ chain: 'ethereum', statement: 'I accept the Terms of Service at https://example.com/tos' }) // uses window.solana for the wallet const { data, error } = await supabase.auth.signInWithWeb3({ chain: 'solana', statement: 'I accept the Terms of Service at https://example.com/tos' })
Get user claims from verified JWT
Extracts the JWT claims present in the access token by first verifying the JWT against the server's JSON Web Key Set endpoint /.well-known/jwks.json
which is often cached, resulting in significantly faster responses. Prefer this method over #getUser which always sends a request to the Auth server for each JWT.
If the project is not using an asymmetric JWT signing key (like ECC or RSA) it always sends a request to the Auth server (similar to #getUser) to verify the JWT.
- Parses the user's access token as a JSON Web Token (JWT) and returns its components if valid and not expired.
- If your project is using asymmetric JWT signing keys, then the verification is done locally usually without a network request using the WebCrypto API.
- A network request is sent to your project's JWT signing key discovery endpoint
https://project-id.supabase.co/auth/v1/.well-known/jwks.json
, which is cached locally. If your environment is ephemeral, such as a Lambda function that is destroyed after every request, a network request will be sent for each new invocation. Supabase provides a network-edge cache providing fast responses for these situations. - If the user's access token is about to expire when calling this function, the user's session will first be refreshed before validating the JWT.
- If your project is using a symmetric secret to sign the JWT, it always sends a request similar to
getUser()
to validate the JWT at the server before returning the decoded token. This is also used if the WebCrypto API is not available in the environment. Make sure you polyfill it in such situations. - The returned claims can be customized per project using the Custom Access Token Hook.
Parameters
- jwtOptionalstring
An optional specific JWT you wish to verify, not the one you can obtain from #getSession.
- optionsRequiredobject
Various additional options that allow you to customize the behavior of this method.
Return Type
- Option 1object
- Option 2object
- Option 3object
1const { data, error } = await supabase.auth.getClaims()
Sign out a user
Inside a browser context, signOut()
will remove the logged in user from the browser session and log them out - removing all items from localstorage and then trigger a "SIGNED_OUT"
event.
For server-side management, you can revoke all refresh tokens for a user by passing a user's JWT through to auth.api.signOut(JWT: string)
. There is no way to revoke a user's access token jwt until it expires. It is recommended to set a shorter expiry on the jwt for this reason.
If using others
scope, no SIGNED_OUT
event is fired!
- In order to use the
signOut()
method, the user needs to be signed in first. - By default,
signOut()
uses the global scope, which signs out all other sessions that the user is logged into as well. Customize this behavior by passing a scope parameter. - Since Supabase Auth uses JWTs for authentication, the access token JWT will be valid until it's expired. When the user signs out, Supabase revokes the refresh token and deletes the JWT from the client-side. This does not revoke the JWT and it will still be valid until it expires.
Parameters
- optionsRequiredSignOut
Return Type
1const { error } = await supabase.auth.signOut()
Send a password reset request
Sends a password reset request to an email address. This method supports the PKCE flow.
- The password reset flow consist of 2 broad steps: (i) Allow the user to login via the password reset link; (ii) Update the user's password.
- The
resetPasswordForEmail()
only sends a password reset link to the user's email. To update the user's password, seeupdateUser()
. - A
PASSWORD_RECOVERY
event will be emitted when the password recovery link is clicked. You can useonAuthStateChange()
to listen and invoke a callback function on these events. - When the user clicks the reset link in the email they are redirected back to your application. You can configure the URL that the user is redirected to with the
redirectTo
parameter. See redirect URLs and wildcards to add additional redirect URLs to your project. - After the user has been redirected successfully, prompt them for a new password and call
updateUser()
:
123const { data, error } = await supabase.auth.updateUser({ password: new_password})
Parameters
- emailRequiredstring
The email address of the user.
- optionsRequiredobject
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.resetPasswordForEmail(email, { redirectTo: 'https://example.com/update-password',})
Verify and log in through OTP
Log in a user given a User supplied OTP or TokenHash received through mobile or email.
- The
verifyOtp
method takes in different verification types. - If a phone number is used, the type can either be:
sms
â Used when verifying a one-time password (OTP) sent via SMS during sign-up or sign-in.phone_change
â Used when verifying an OTP sent to a new phone number during a phone number update process.
- If an email address is used, the type can be one of the following (note:
signup
andmagiclink
types are deprecated):email
â Used when verifying an OTP sent to the user's email during sign-up or sign-in.recovery
â Used when verifying an OTP sent for account recovery, typically after a password reset request.invite
â Used when verifying an OTP sent as part of an invitation to join a project or organization.email_change
â Used when verifying an OTP sent to a new email address during an email update process.
- The verification type used should be determined based on the corresponding auth method called before
verifyOtp
to sign up / sign-in a user. - The
TokenHash
is contained in the email templates and can be used to sign in. You may wish to use the hash with Magic Links for the PKCE flow for Server Side Auth. See this guide for more details.
Parameters
- paramsRequiredOne of the following options
- Option 1VerifyMobileOtpParams
- Option 2VerifyEmailOtpParams
- Option 3VerifyTokenHashParams
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.verifyOtp({ email, token, type: 'email'})
Retrieve a session
Returns the session, refreshing it if necessary.
The session returned can be null if the session is not detected which can happen in the event a user is not signed-in or has logged out.
IMPORTANT: This method loads values directly from the storage attached to the client. If that storage is based on request cookies for example, the values in it may not be authentic and therefore it's strongly advised against using this method and its results in such circumstances. A warning will be emitted if this is detected. Use #getUser() instead.
- Since the introduction of asymmetric JWT signing keys, this method is considered low-level and we encourage you to use
getClaims()
orgetUser()
instead. - Retrieves the current user session from the storage medium (local storage, cookies).
- The session contains an access token (signed JWT), a refresh token and the user object.
- If the session's access token is expired or is about to expire, this method will use the refresh token to refresh the session.
- When using in a browser, or you've called
startAutoRefresh()
in your environment (React Native, etc.) this function always returns a valid access token without refreshing the session itself, as this is done in the background. This function returns very fast. - IMPORTANT SECURITY NOTICE: If using an insecure storage medium, such as cookies or request headers, the user object returned by this function must not be trusted. Always verify the JWT using
getClaims()
or your own JWT verification library to securely establish the user's identity and access. You can also usegetUser()
to fetch the user object directly from the Auth server for this purpose. - When using in a browser, this function is synchronized accross all tabs using the LockManager API. In other environments make sure you've defined a proper
lock
property, if necessary, to make sure there are no race conditions while the session is being refreshed.
Return Type
- Option 1object
- Option 2object
- Option 3object
1const { data, error } = await supabase.auth.getSession()
Retrieve a new session
Returns a new session, regardless of expiry status. Takes in an optional current session. If not passed in, then refreshSession() will attempt to retrieve it from getSession(). If the current session's refresh token is invalid, an error will be thrown.
- This method will refresh and return a new session whether the current one is expired or not.
Parameters
- currentSessionOptionalobject
The current session. If passed in, it must contain a refresh token.
Return Type
- Option 1object
- Option 2object
12const { data, error } = await supabase.auth.refreshSession()const { session, user } = data
Retrieve a user
Gets the current user details if there is an existing session. This method performs a network request to the Supabase Auth server, so the returned value is authentic and can be used to base authorization rules on.
- This method fetches the user object from the database instead of local session.
- This method is useful for checking if the user is authorized because it validates the user's access token JWT on the server.
- Should always be used when checking for user authorization on the server. On the client, you can instead use
getSession().session.user
for faster results.getSession
is insecure on the server.
Parameters
- jwtOptionalstring
Takes in an optional access token JWT. If no JWT is provided, the JWT from the current session is used.
Return Type
- Option 1object
- Option 2object
1const { data: { user } } = await supabase.auth.getUser()
Update a user
Updates user data for a logged in user.
- In order to use the
updateUser()
method, the user needs to be signed in first. - By default, email updates sends a confirmation link to both the user's current and new email. To only send a confirmation link to the user's new email, disable Secure email change in your project's email auth provider settings.
Parameters
- attributesRequiredUserAttributes
- optionsRequiredobject
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.updateUser({ email: 'new@email.com'})
Retrieve identities linked to a user
Gets all the identities linked to a user.
- The user needs to be signed in to call
getUserIdentities()
.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.getUserIdentities()
Link an identity to a user
Links an oauth identity to an existing user. This method supports the PKCE flow.
- The Enable Manual Linking option must be enabled from your project's authentication settings.
- The user needs to be signed in to call
linkIdentity()
. - If the candidate identity is already linked to the existing user or another user,
linkIdentity()
will fail. - If
linkIdentity
is run in the browser, the user is automatically redirected to the returned URL. On the server, you should handle the redirect.
Parameters
- credentialsRequiredSignInWithOAuthCredentials
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.linkIdentity({ provider: 'github'})
Unlink an identity from a user
Unlinks an identity from a user by deleting it. The user will no longer be able to sign in with that identity once it's unlinked.
- The Enable Manual Linking option must be enabled from your project's authentication settings.
- The user needs to be signed in to call
unlinkIdentity()
. - The user must have at least 2 identities in order to unlink an identity.
- The identity to be unlinked must belong to the user.
Parameters
- identityRequiredUserIdentity
Return Type
- Option 1object
- Option 2object
12345678910// retrieve all identities linked to a userconst identities = await supabase.auth.getUserIdentities()// find the google identityconst googleIdentity = identities.find( identity => identity.provider === 'google')// unlink the google identityconst { error } = await supabase.auth.unlinkIdentity(googleIdentity)
Send a password reauthentication nonce
Sends a reauthentication OTP to the user's email or phone number. Requires the user to be signed-in.
- This method is used together with
updateUser()
when a user's password needs to be updated. - If you require your user to reauthenticate before updating their password, you need to enable the Secure password change option in your project's email provider settings.
- A user is only require to reauthenticate before updating their password if Secure password change is enabled and the user hasn't recently signed in. A user is deemed recently signed in if the session was created in the last 24 hours.
- This method will send a nonce to the user's email. If the user doesn't have a confirmed email address, the method will send the nonce to the user's confirmed phone number instead.
- After receiving the OTP, include it as the
nonce
in yourupdateUser()
call to finalize the password change.
Return Type
- Option 1object
- Option 2object
1const { error } = await supabase.auth.reauthenticate()
Resend an OTP
Resends an existing signup confirmation email, email change email, SMS OTP or phone change OTP.
- Resends a signup confirmation, email change or phone change email to the user.
- Passwordless sign-ins can be resent by calling the
signInWithOtp()
method again. - Password recovery emails can be resent by calling the
resetPasswordForEmail()
method again. - This method will only resend an email or phone OTP to the user if there was an initial signup, email change or phone change request being made(note: For existing users signing in with OTP, you should use
signInWithOtp()
again to resend the OTP). - You can specify a redirect url when you resend an email link using the
emailRedirectTo
option.
Parameters
- credentialsRequiredOne of the following options
- Option 1object
- Option 2object
Return Type
- Option 1object
- Option 2object
1234567const { error } = await supabase.auth.resend({ type: 'signup', email: 'email@example.com', options: { emailRedirectTo: 'https://example.com/welcome' }})
Set the session data
Sets the session data from the current session. If the current session is expired, setSession will take care of refreshing it to obtain a new session. If the refresh token or access token in the current session is invalid, an error will be thrown.
- This method sets the session using an
access_token
andrefresh_token
. - If successful, a
SIGNED_IN
event is emitted.
Parameters
- currentSessionRequiredobject
The current session that minimally contains an access token and refresh token.
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.setSession({ access_token, refresh_token })
Exchange an auth code for a session
Log in an existing user by exchanging an Auth Code issued during the PKCE flow.
- Used when
flowType
is set topkce
in client options.
Parameters
- authCodeRequiredstring
Return Type
- Option 1object
- Option 2object
1supabase.auth.exchangeCodeForSession('34e770dd-9ff9-416c-87fa-43b31d7ef225')
Start auto-refresh session (non-browser)
Starts an auto-refresh process in the background. The session is checked every few seconds. Close to the time of expiration a process is started to refresh the session. If refreshing fails it will be retried for as long as necessary.
If you set the GoTrueClientOptions#autoRefreshToken you don't need to call this function, it will be called for you.
On browsers the refresh process works only when the tab/window is in the foreground to conserve resources as well as prevent race conditions and flooding auth with requests. If you call this method any managed visibility change callback will be removed and you must manage visibility changes on your own.
On non-browser platforms the refresh process works continuously in the background, which may not be desirable. You should hook into your platform's foreground indication mechanism and call these methods appropriately to conserve resources.
#stopAutoRefresh
- Only useful in non-browser environments such as React Native or Electron.
- The Supabase Auth library automatically starts and stops proactively refreshing the session when a tab is focused or not.
- On non-browser platforms, such as mobile or desktop apps built with web technologies, the library is not able to effectively determine whether the application is focused or not.
- To give this hint to the application, you should be calling this method when the app is in focus and calling
supabase.auth.stopAutoRefresh()
when it's out of focus.
Return Type
12345678910import { AppState } from 'react-native'// make sure you register this only once!AppState.addEventListener('change', (state) => { if (state === 'active') { supabase.auth.startAutoRefresh() } else { supabase.auth.stopAutoRefresh() }})
Stop auto-refresh session (non-browser)
Stops an active auto refresh process running in the background (if any).
If you call this method any managed visibility change callback will be removed and you must manage visibility changes on your own.
See #startAutoRefresh for more details.
- Only useful in non-browser environments such as React Native or Electron.
- The Supabase Auth library automatically starts and stops proactively refreshing the session when a tab is focused or not.
- On non-browser platforms, such as mobile or desktop apps built with web technologies, the library is not able to effectively determine whether the application is focused or not.
- When your application goes in the background or out of focus, call this method to stop the proactive refreshing of the session.
Return Type
12345678910import { AppState } from 'react-native'// make sure you register this only once!AppState.addEventListener('change', (state) => { if (state === 'active') { supabase.auth.startAutoRefresh() } else { supabase.auth.stopAutoRefresh() }})
Auth MFA
This section contains methods commonly used for Multi-Factor Authentication (MFA) and are invoked behind the supabase.auth.mfa
namespace.
Currently, there is support for time-based one-time password (TOTP) and phone verification code as the 2nd factor. Recovery codes are not supported but users can enroll multiple factors, with an upper limit of 10.
Having a 2nd factor for recovery frees the user of the burden of having to store their recovery codes somewhere. It also reduces the attack surface since multiple recovery codes are usually generated compared to just having 1 backup factor.
Learn more about implementing MFA in your application in the MFA guide.
Enroll a factor
Starts the enrollment process for a new Multi-Factor Authentication (MFA) factor. This method creates a new unverified
factor. To verify a factor, present the QR code or secret to the user and ask them to add it to their authenticator app. The user has to enter the code from their authenticator app to verify it.
Upon verifying a factor, all other sessions are logged out and the current session's authenticator level is promoted to aal2
.
- Use
totp
orphone
as thefactorType
and use the returnedid
to create a challenge. - To create a challenge, see
mfa.challenge()
. - To verify a challenge, see
mfa.verify()
. - To create and verify a TOTP challenge in a single step, see
mfa.challengeAndVerify()
. - To generate a QR code for the
totp
secret in Next.js, you can do the following:
1<Image src={data.totp.qr_code} alt={data.totp.uri} layout="fill"></Image>
- The
challenge
andverify
steps are separated when using Phone factors as the user will need time to receive and input the code obtained from the SMS in challenge.
Parameters
- paramsRequiredOne of the following options
- Option 1MFAEnrollTOTPParams
- Option 2MFAEnrollPhoneParams
- Option 3object
- Option 4object
Return Type
- Option 1object
- Option 2object
12345678910const { data, error } = await supabase.auth.mfa.enroll({ factorType: 'totp', friendlyName: 'your_friendly_name'})// Use the id to create a challenge.// The challenge can be verified by entering the code generated from the authenticator app.// The code will be generated upon scanning the qr_code or entering the secret into the authenticator app.const { id, type, totp: { qr_code, secret, uri }, friendly_name } = dataconst challenge = await supabase.auth.mfa.challenge({ factorId: id });
Create a challenge
Prepares a challenge used to verify that a user has access to a MFA factor.
- An enrolled factor is required before creating a challenge.
- To verify a challenge, see
mfa.verify()
. - A phone factor sends a code to the user upon challenge. The channel defaults to
sms
unless otherwise specified.
Parameters
- paramsRequiredMFAChallengeParams
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.mfa.challenge({ factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225'})
Verify a challenge
Verifies a code against a challenge. The verification code is provided by the user by entering a code seen in their authenticator app.
- To verify a challenge, please create a challenge first.
Parameters
- paramsRequiredMFAVerifyParams
Return Type
- Option 1object
- Option 2object
12345const { data, error } = await supabase.auth.mfa.verify({ factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225', challengeId: '4034ae6f-a8ce-4fb5-8ee5-69a5863a7c15', code: '123456'})
Create and verify a challenge
Helper method which creates a challenge and immediately uses the given code to verify against it thereafter. The verification code is provided by the user by entering a code seen in their authenticator app.
- Intended for use with only TOTP factors.
- An enrolled factor is required before invoking
challengeAndVerify()
. - Executes
mfa.challenge()
andmfa.verify()
in a single step.
Parameters
- paramsRequiredMFAChallengeAndVerifyParams
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.mfa.challengeAndVerify({ factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225', code: '123456'})
Unenroll a factor
Unenroll removes a MFA factor. A user has to have an aal2
authenticator level in order to unenroll a verified
factor.
Parameters
- paramsRequiredMFAUnenrollParams
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.mfa.unenroll({ factorId: '34e770dd-9ff9-416c-87fa-43b31d7ef225',})
Get Authenticator Assurance Level
Returns the Authenticator Assurance Level (AAL) for the active session.
aal1
(ornull
) means that the user's identity has been verified only with a conventional login (email+password, OTP, magic link, social login, etc.).aal2
means that the user's identity has been verified both with a conventional login and at least one MFA factor.
Although this method returns a promise, it's fairly quick (microseconds) and rarely uses the network. You can use this to check whether the current user needs to be shown a screen to verify their MFA factors.
- Authenticator Assurance Level (AAL) is the measure of the strength of an authentication mechanism.
- In Supabase, having an AAL of
aal1
refers to having the 1st factor of authentication such as an email and password or OAuth sign-in whileaal2
refers to the 2nd factor of authentication such as a time-based, one-time-password (TOTP) or Phone factor. - If the user has a verified factor, the
nextLevel
field will returnaal2
, else, it will returnaal1
.
Return Type
- Option 1object
- Option 2object
12const { data, error } = await supabase.auth.mfa.getAuthenticatorAssuranceLevel()const { currentLevel, nextLevel, currentAuthenticationMethods } = data
Auth Admin
- Any method under the
supabase.auth.admin
namespace requires aservice_role
key. - These methods are considered admin methods and should be called on a trusted server. Never expose your
service_role
key in the browser.
1234567891011import { createClient } from '@supabase/supabase-js'const supabase = createClient(supabase_url, service_role_key, { auth: { autoRefreshToken: false, persistSession: false }})// Access auth admin apiconst adminAuthClient = supabase.auth.admin
Retrieve a user
Get user by id.
- Fetches the user object from the database based on the user's id.
- The
getUserById()
method requires the user's id which maps to theauth.users.id
column.
Parameters
- uidRequiredstring
The user's unique identifier
This function should only be called on a server. Never expose your
service_role
key in the browser.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.getUserById(1)
List all users
Get a list of users.
This function should only be called on a server. Never expose your service_role
key in the browser.
- Defaults to return 50 users per page.
Parameters
- paramsOptionalPageParams
An object which supports
page
andperPage
as numbers, to alter the paginated results.
Return Type
- Option 1object
- Option 2object
1const { data: { users }, error } = await supabase.auth.admin.listUsers()
Create a user
Creates a new user. This function should only be called on a server. Never expose your service_role
key in the browser.
- To confirm the user's email address or phone number, set
email_confirm
orphone_confirm
to true. Both arguments default to false. createUser()
will not send a confirmation email to the user. You can useinviteUserByEmail()
if you want to send them an email invite instead.- If you are sure that the created user's email or phone number is legitimate and verified, you can set the
email_confirm
orphone_confirm
param totrue
.
Parameters
- attributesRequiredAdminUserAttributes
Return Type
- Option 1object
- Option 2object
12345const { data, error } = await supabase.auth.admin.createUser({ email: 'user@email.com', password: 'password', user_metadata: { name: 'Yoda' }})
Delete a user
Delete a user. Requires a service_role
key.
- The
deleteUser()
method requires the user's ID, which maps to theauth.users.id
column.
Parameters
- idRequiredstring
The user id you want to remove.
- shouldSoftDeleteRequiredboolean
If true, then the user will be soft-deleted from the auth schema. Soft deletion allows user identification from the hashed user ID but is not reversible. Defaults to false for backward compatibility.
This function should only be called on a server. Never expose your
service_role
key in the browser.
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase.auth.admin.deleteUser( '715ed5db-f090-4b8c-a067-640ecee36aa0')
Send an email invite link
Sends an invite link to an email address.
- Sends an invite link to the user's email address.
- The
inviteUserByEmail()
method is typically used by administrators to invite users to join the application. - Note that PKCE is not supported when using
inviteUserByEmail
. This is because the browser initiating the invite is often different from the browser accepting the invite which makes it difficult to provide the security guarantees required of the PKCE flow.
Parameters
- emailRequiredstring
The email address of the user.
- optionsRequiredobject
Additional options to be included when inviting.
Return Type
- Option 1object
- Option 2object
1const { data, error } = await supabase.auth.admin.inviteUserByEmail('email@example.com')
Generate an email link
Generates email links and OTPs to be sent via a custom email provider.
- The following types can be passed into
generateLink()
:signup
,magiclink
,invite
,recovery
,email_change_current
,email_change_new
,phone_change
. generateLink()
only generates the email link foremail_change_email
if the Secure email change is enabled in your project's email auth provider settings.generateLink()
handles the creation of the user forsignup
,invite
andmagiclink
.
Parameters
- paramsRequiredGenerateLinkParams
Return Type
- Option 1object
- Option 2object
12345const { data, error } = await supabase.auth.admin.generateLink({ type: 'signup', email: 'email@example.com', password: 'secret'})
Update a user
Updates the user data.
Parameters
- uidRequiredstring
- attributesRequiredAdminUserAttributes
The data you want to update.
This function should only be called on a server. Never expose your
service_role
key in the browser.
Return Type
- Option 1object
- Option 2object
1234const { data: user, error } = await supabase.auth.admin.updateUserById( '11111111-1111-1111-1111-111111111111', { email: 'new@email.com' })
Delete a factor for a user
Deletes a factor on a user. This will log the user out of all active sessions if the deleted factor was verified.
Parameters
- paramsRequiredAuthMFAAdminDeleteFactorParams
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase.auth.admin.mfa.deleteFactor({ id: '34e770dd-9ff9-416c-87fa-43b31d7ef225', userId: 'a89baba7-b1b7-440f-b4bb-91026967f66b',})
Invokes a Supabase Edge Function.
Invokes a function
Invoke a Supabase Edge Function.
- Requires an Authorization header.
- Invoke params generally match the Fetch API spec.
- When you pass in a body to your function, we automatically attach the Content-Type header for
Blob
,ArrayBuffer
,File
,FormData
andString
. If it doesn't match any of these types we assume the payload isjson
, serialize it and attach theContent-Type
header asapplication/json
. You can override this behavior by passing in aContent-Type
header of your own. - Responses are automatically parsed as
json
,blob
andform-data
depending on theContent-Type
header sent by your function. Responses are parsed astext
by default.
Parameters
- functionNameRequiredstring
The name of the Function to invoke.
- optionsRequiredFunctionInvokeOptions
Options for invoking the Function.
Return Type
123const { data, error } = await supabase.functions.invoke('hello', { body: { foo: 'bar' }})
Subscribe to channel
Creates an event handler that listens to changes.
- By default, Broadcast and Presence are enabled for all projects.
- By default, listening to database changes is disabled for new projects due to database performance and security concerns. You can turn it on by managing Realtime's replication.
- You can receive the "previous" data for updates and deletes by setting the table's
REPLICA IDENTITY
toFULL
(e.g.,ALTER TABLE your_table REPLICA IDENTITY FULL;
). - Row level security is not applied to delete statements. When RLS is enabled and replica identity is set to full, only the primary key is sent to clients.
Parameters
- typeRequiredOne of the following options
- Option 1"presence"
- Option 2"postgres_changes"
- Option 3"broadcast"
- Option 4"system"
- filterRequiredOne of the following options
- Option 1object
- Option 2object
- Option 3object
- Option 4RealtimePostgresChangesFilter
- Option 5object
- callbackRequiredfunction
12345678910111213const channel = supabase.channel("room1")channel.on("broadcast", { event: "cursor-pos" }, (payload) => { console.log("Cursor position received!", payload);}).subscribe((status) => { if (status === "SUBSCRIBED") { channel.send({ type: "broadcast", event: "cursor-pos", payload: { x: Math.random(), y: Math.random() }, }); }});
Unsubscribe from a channel
Unsubscribes and removes Realtime channel from Realtime client.
- Removing a channel is a great way to maintain the performance of your project's Realtime service as well as your database if you're listening to Postgres changes. Supabase will automatically handle cleanup 30 seconds after a client is disconnected, but unused channels may cause degradation as more clients are simultaneously subscribed.
Parameters
- channelRequired@supabase/realtime-js.RealtimeChannel
The name of the Realtime channel.
Return Type
- Option 1"error"
- Option 2"ok"
- Option 3"timed out"
1supabase.removeChannel(myChannel)
Unsubscribe from all channels
Unsubscribes and removes all Realtime channels from Realtime client.
- Removing channels is a great way to maintain the performance of your project's Realtime service as well as your database if you're listening to Postgres changes. Supabase will automatically handle cleanup 30 seconds after a client is disconnected, but unused channels may cause degradation as more clients are simultaneously subscribed.
Return Type
1supabase.removeAllChannels()
Retrieve all channels
Returns all Realtime channels.
Return Type
1const channels = supabase.getChannels()
Broadcast a message
Sends a message into the channel.
Broadcast a message to all connected clients to a channel.
- When using REST you don't need to subscribe to the channel
- REST calls are only available from 2.37.0 onwards
Parameters
- argsRequiredobject
Arguments to send to channel
- optsRequired{ [key: string]: any }
Options to be used during the send process
Return Type
- Option 1"ok"
- Option 2"timed out"
- Option 3"error"
1234567891011supabase .channel('room1') .subscribe((status) => { if (status === 'SUBSCRIBED') { channel.send({ type: 'broadcast', event: 'cursor-pos', payload: { x: Math.random(), y: Math.random() }, }) } })
Create a bucket
Creates a new Storage bucket
- RLS policy permissions required:
buckets
table permissions:insert
objects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idRequiredstring
A unique identifier for the bucket you are creating.
- optionsRequiredobject
Return Type
- Option 1object
- Option 2object
1234567const { data, error } = await supabase .storage .createBucket('avatars', { public: false, allowedMimeTypes: ['image/png'], fileSizeLimit: 1024 })
Retrieve a bucket
Retrieves the details of an existing Storage bucket.
- RLS policy permissions required:
buckets
table permissions:select
objects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idRequiredstring
The unique identifier of the bucket you would like to retrieve.
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase .storage .getBucket('avatars')
List all buckets
Retrieves the details of all Storage buckets within an existing project.
- RLS policy permissions required:
buckets
table permissions:select
objects
table permissions: none
- Refer to the Storage guide on how access control works
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase .storage .listBuckets()
Update a bucket
Updates a Storage bucket
- RLS policy permissions required:
buckets
table permissions:select
andupdate
objects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idRequiredstring
A unique identifier for the bucket you are updating.
- optionsRequiredobject
Return Type
- Option 1object
- Option 2object
1234567const { data, error } = await supabase .storage .updateBucket('avatars', { public: false, allowedMimeTypes: ['image/png'], fileSizeLimit: 1024 })
Delete a bucket
Deletes an existing bucket. A bucket can't be deleted with existing objects inside it. You must first empty()
the bucket.
- RLS policy permissions required:
buckets
table permissions:select
anddelete
objects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- idRequiredstring
The unique identifier of the bucket you would like to delete.
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase .storage .deleteBucket('avatars')
Empty a bucket
Removes all objects inside a single bucket.
- RLS policy permissions required:
buckets
table permissions:select
objects
table permissions:select
anddelete
- Refer to the Storage guide on how access control works
Parameters
- idRequiredstring
The unique identifier of the bucket you would like to empty.
Return Type
- Option 1object
- Option 2object
123const { data, error } = await supabase .storage .emptyBucket('avatars')
Upload a file
Uploads a file to an existing bucket.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions: onlyinsert
when you are uploading new files andselect
,insert
andupdate
when you are upserting files
- Refer to the Storage guide on how access control works
- For React Native, using either
Blob
,File
orFormData
does not work as intended. Upload file usingArrayBuffer
from base64 file data instead, see example below.
Parameters
- pathRequiredstring
The file path, including the file name. Should be of the format
folder/subfolder/filename.png
. The bucket must already exist before attempting to upload. - fileBodyRequiredFileBody
The body of the file to be stored in the bucket.
- fileOptionsOptionalFileOptions
Return Type
- Option 1object
- Option 2object
12345678const avatarFile = event.target.files[0]const { data, error } = await supabase .storage .from('avatars') .upload('public/avatar1.png', avatarFile, { cacheControl: '3600', upsert: false })
Download a file
Downloads a file from a private bucket. For public buckets, make a request to the URL returned from getPublicUrl
instead.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathRequiredstring
The full path and file name of the file to be downloaded. For example
folder/image.png
. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .download('folder/avatar1.png')
List all files in a bucket
Lists all the files and folders within a path of the bucket.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathOptionalstring
The folder path.
- optionsOptionalSearchOptions
Search options including limit (defaults to 100), offset, sortBy, and search
- parametersOptionalFetchParameters
Return Type
- Option 1object
- Option 2object
12345678const { data, error } = await supabase .storage .from('avatars') .list('folder', { limit: 100, offset: 0, sortBy: { column: 'name', order: 'asc' }, })
Replace an existing file
Replaces an existing file at the specified path with a new one.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:update
andselect
- Refer to the Storage guide on how access control works
- For React Native, using either
Blob
,File
orFormData
does not work as intended. Update file usingArrayBuffer
from base64 file data instead, see example below.
Parameters
- pathRequiredstring
The relative file path. Should be of the format
folder/subfolder/filename.png
. The bucket must already exist before attempting to update. - fileBodyRequiredOne of the following options
The body of the file to be stored in the bucket.
- Option 1string
- Option 2ArrayBuffer
- Option 3ArrayBufferView
- Option 4Blob
- Option 5@types/node.Buffer
- Option 6File
- Option 7FormData
- Option 8@types/node.NodeJS.ReadableStream
- Option 9ReadableStream
- Option 10URLSearchParams
- fileOptionsOptionalFileOptions
Return Type
- Option 1object
- Option 2object
12345678const avatarFile = event.target.files[0]const { data, error } = await supabase .storage .from('avatars') .update('public/avatar1.png', avatarFile, { cacheControl: '3600', upsert: true })
Move an existing file
Moves an existing file to a new path in the same bucket.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:update
andselect
- Refer to the Storage guide on how access control works
Parameters
- fromPathRequiredstring
The original file path, including the current file name. For example
folder/image.png
. - toPathRequiredstring
The new file path, including the new file name. For example
folder/image-new.png
. - optionsOptionalDestinationOptions
The destination options.
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .move('public/avatar1.png', 'private/avatar2.png')
Copy an existing file
Copies an existing file to a new path in the same bucket.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:insert
andselect
- Refer to the Storage guide on how access control works
Parameters
- fromPathRequiredstring
The original file path, including the current file name. For example
folder/image.png
. - toPathRequiredstring
The new file path, including the new file name. For example
folder/image-copy.png
. - optionsOptionalDestinationOptions
The destination options.
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .copy('public/avatar1.png', 'private/avatar2.png')
Delete files in a bucket
Deletes files within the same bucket
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:delete
andselect
- Refer to the Storage guide on how access control works
Parameters
- pathsRequiredArray<string>
An array of files to delete, including the path and file name. For example [
'folder/image.png'
].
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .remove(['folder/avatar1.png'])
Create a signed URL
Creates a signed URL. Use a signed URL to share a file for a fixed amount of time.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathRequiredstring
The file path, including the current file name. For example
folder/image.png
. - expiresInRequirednumber
The number of seconds until the signed URL expires. For example,
60
for a URL which is valid for one minute. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .createSignedUrl('folder/avatar1.png', 60)
Create signed URLs
Creates multiple signed URLs. Use a signed URL to share a file for a fixed amount of time.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:select
- Refer to the Storage guide on how access control works
Parameters
- pathsRequiredArray<string>
The file paths to be downloaded, including the current file names. For example
['folder/image.png', 'folder2/image2.png']
. - expiresInRequirednumber
The number of seconds until the signed URLs expire. For example,
60
for URLs which are valid for one minute. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .createSignedUrls(['folder/avatar1.png', 'folder/avatar2.png'], 60)
Create signed upload URL
Creates a signed upload URL. Signed upload URLs can be used to upload files to the bucket without further authentication. They are valid for 2 hours.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions:insert
- Refer to the Storage guide on how access control works
Parameters
- pathRequiredstring
The file path, including the current file name. For example
folder/image.png
. - optionsOptionalobject
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .createSignedUploadUrl('folder/cat.jpg')
Upload to a signed URL
Upload a file with a token generated from createSignedUploadUrl
.
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- pathRequiredstring
The file path, including the file name. Should be of the format
folder/subfolder/filename.png
. The bucket must already exist before attempting to upload. - tokenRequiredstring
The token generated from
createSignedUploadUrl
- fileBodyRequiredFileBody
The body of the file to be stored in the bucket.
- fileOptionsOptionalFileOptions
Return Type
- Option 1object
- Option 2object
1234const { data, error } = await supabase .storage .from('avatars') .uploadToSignedUrl('folder/cat.jpg', 'token-from-createSignedUploadUrl', file)
Retrieve public URL
A simple convenience function to get the URL for an asset in a public bucket. If you do not want to use this function, you can construct the public URL by concatenating the bucket URL with the path to the asset. This function does not verify if the bucket is public. If a public URL is created for a bucket which is not public, you will not be able to download the asset.
- The bucket needs to be set to public, either via updateBucket() or by going to Storage on supabase.com/dashboard, clicking the overflow menu on a bucket and choosing "Make public"
- RLS policy permissions required:
buckets
table permissions: noneobjects
table permissions: none
- Refer to the Storage guide on how access control works
Parameters
- pathRequiredstring
The path and name of the file to generate the public URL for. For example
folder/image.png
. - optionsOptionalobject
Return Type
1234const { data } = supabase .storage .from('public-bucket') .getPublicUrl('folder/avatar1.png')