Simplify your stack and build anything. Or everything.
Build tomorrow’s web with a modern solution you truly own.
Code-based nature means you can build on top of it to power anything.
It’s time to take back your content infrastructure.

Authentication Config

Payload's Authentication is extremely powerful and gives you everything you need when you go to build a new app or site in a secure and responsible manner.

To enable Authentication on a collection, define an auth property and set it to either true or to an object containing the options below.

Options

OptionDescription
useAPIKeyPayload Authentication provides for API keys to be set on each user within an Authentication-enabled Collection. More
tokenExpirationHow long (in seconds) to keep the user logged in. JWTs and HTTP-only cookies will both expire at the same time.
maxLoginAttemptsOnly allow a user to attempt logging in X amount of times. Automatically locks out a user from authenticating if this limit is passed. Set to 0 to disable.
lockTimeSet the time (in milliseconds) that a user should be locked out if they fail authentication more times than maxLoginAttempts allows for.
depthHow many levels deep a user document should be populated when creating the JWT and binding the user to the express req. Defaults to 0 and should only be modified if absolutely necessary, as this will affect performance.
cookiesSet cookie options, including secure, sameSite, and domain. For advanced users.
forgotPasswordCustomize the way that the forgotPassword operation functions. More
verifySet to true or pass an object with verification options to require users to verify by email before they are allowed to log into your app. More
disableLocalStrategyAdvanced - disable Payload's built-in local auth strategy. Only use this property if you have replaced Payload's auth mechanisms with your own.
strategiesAdvanced - an array of PassportJS authentication strategies to extend this collection's authentication with. More

API keys

To integrate with third-party APIs or services, you might need the ability to generate API keys that can be used to identify as a certain user within Payload.

In Payload, users are essentially documents within a collection. Just like you can authenticate as a user with an email and password, which is considered as our default local auth strategy, you can also authenticate as a user with an API key. API keys are generated on a user-by-user basis, similar to email and passwords, and are meant to represent a single user.

For example, if you have a third-party service or external app that needs to be able to perform protected actions at its discretion, you have two options:

  1. Create a user for the third-party app, and log in each time to receive a token before you attempt to access any protected actions
  2. Enable API key support for the Collection, where you can generate a non-expiring API key per user in the collection. This is particularly useful as you can create a "user" that reflects an integration with a specific external service and assign a "role" or specific access only needed by that service/integration. Alternatively, you could create a "super admin" user and assign an API key to that user so that any requests made with that API key are considered as being made by that super user.

Technically, both of these options will work for third-party integrations but the second option with API key is simpler, because it reduces the amount of work that your integrations need to do to be authenticated properly.

To enable API keys on a collection, set the useAPIKey auth option to true. From there, a new interface will appear in the Admin panel for each document within the collection that allows you to generate an API key for each user in the Collection.

Authenticating via API Key

To authenticate REST or GraphQL API requests using an API key, set the Authorization header. The header is case-sensitive and needs the slug of the auth.useAPIKey enabled collection, then " API-Key ", followed by the apiKey that has been assigned. Payload's built-in middleware will then assign the user document to req.user and handle requests with the proper access control. By doing this, Payload recognizes the request being made as a request by the user associated with that API key.

For example, using Fetch:

1
import User from '../collections/User'
2
3
const response = await fetch('http://localhost:3000/api/pages', {
4
headers: {
5
Authorization: `${User.slug} API-Key ${YOUR_API_KEY}`,
6
},
7
})

Payload ensures that the same, uniform access control is used across all authentication strategies. This enables you to utilize your existing access control configurations with both API keys and the standard email/password authentication. This consistency can aid in maintaining granular control over your API keys.

API Key Only Authentication

If you want to use API keys as the only authentication method for a collection, you can disable the default local strategy by setting disableLocalStrategy to true on the collection's auth property. This will disable the ability to authenticate with email and password, and will only allow for authentication via API key.

1
import { CollectionConfig } from 'payload/types'
2
3
export const Customers: CollectionConfig = {
4
slug: 'customers',
5
auth: {
6
useAPIKey: true,
7
disableLocalStrategy: true,
8
},
9
}

Forgot Password

You can customize how the Forgot Password workflow operates with the following options on the auth.forgotPassword property:

generateEmailHTML

Function that accepts one argument, containing { req, token, user }, that allows for overriding the HTML within emails that are sent to users attempting to reset their password. The function should return a string that supports HTML, which can be a full HTML email.

Example:

1
import { CollectionConfig } from 'payload/types'
2
3
export const Customers: CollectionConfig = {
4
slug: 'customers',
5
auth: {
6
forgotPassword: {
7
generateEmailHTML: ({ req, token, user }) => {
8
// Use the token provided to allow your user to reset their password
9
const resetPasswordURL = `https://yourfrontend.com/reset-password?token=${token}`
10
11
return `
12
<!doctype html>
13
<html>
14
<body>
15
<h1>Here is my custom email template!</h1>
16
<p>Hello, ${user.email}!</p>
17
<p>Click below to reset your password.</p>
18
<p>
19
<a href="${resetPasswordURL}">${resetPasswordURL}</a>
20
</p>
21
</body>
22
</html>
23
`
24
},
25
},
26
},
27
}

generateEmailSubject

Similarly to the above generateEmailHTML, you can also customize the subject of the email. The function argument are the same but you can only return a string - not HTML.

Example:

1
{
2
slug: 'customers',
3
auth: {
4
forgotPassword: {
5
generateEmailSubject: ({ req, user }) => {
6
return `Hey ${user.email}, reset your password!`;
7
}
8
}
9
}
10
}

Email Verification

If you'd like to require email verification before a user can successfully log in, you can enable it by passing true or an options object to auth.verify. The following options are available:

generateEmailHTML

Function that accepts one argument, containing { req, token, user }, that allows for overriding the HTML within emails that are sent to users indicating how to validate their account. The function should return a string that supports HTML, which can optionally be a full HTML email.

Example:

1
import { CollectionConfig } from 'payload/types'
2
3
export const Customers: CollectionConfig = {
4
slug: 'customers',
5
auth: {
6
verify: {
7
generateEmailHTML: ({ req, token, user }) => {
8
// Use the token provided to allow your user to verify their account
9
const url = `https://yourfrontend.com/verify?token=${token}`
10
11
return `Hey ${user.email}, verify your email by clicking here: ${url}`
12
},
13
},
14
},
15
}

generateEmailSubject

Similarly to the above generateEmailHTML, you can also customize the subject of the email. The function argument are the same but you can only return a string - not HTML.

Example:

1
{
2
slug: 'customers',
3
auth: {
4
verify: {
5
generateEmailSubject: ({ req, user }) => {
6
return `Hey ${user.email}, reset your password!`;
7
}
8
}
9
}
10
}

Strategies

As of Payload 1.0.0, you can add additional authentication strategies to Payload easily by passing them to your collection's auth.strategies array.

Behind the scenes, Payload uses PassportJS to power its local authentication strategy, so most strategies listed on the PassportJS website will work seamlessly. Combined with adding custom components to the admin panel's Login view, you can create advanced authentication strategies directly within Payload.

The strategies property is an array that takes objects with the following properties:

strategy

This property can accept a Passport strategy directly, or you can pass a function that takes a payload argument, and returns a Passport strategy.

name

If you pass a strategy to the strategy property directly, the name property is optional and allows you to override the strategy's built-in name.

However, if you pass a function to strategy, name is a required property.

In either case, Payload will prefix the strategy name with the collection slug that the strategy is passed to.

Admin autologin

For testing and demo purposes you may want to skip forcing the admin user to login in order to access the panel. The admin.autologin property is used to configure the how visitors are handled when accessing the admin panel. The default is that all users will have to login and this should not be enabled for environments where data needs to protected.

autoLogin Options

OptionDescription
emailThe email address of the user to login as
passwordThe password of the user to login as
prefillOnlyIf set to true, the login credentials will be prefilled but the user will still need to click the login button.

The recommended way to use this feature is behind an environment variable to ensure it is disabled when in production.

Example:

1
export default buildConfig({
2
admin: {
3
user: 'users',
4
autoLogin:
5
process.env.PAYLOAD_PUBLIC_ENABLE_AUTOLOGIN === 'true'
6
? {
7
email: 'test@example.com',
8
password: 'test',
9
prefillOnly: true,
10
}
11
: false,
12
},
13
collections: [
14
/** */
15
],
16
})
Next

Authentication Operations