better-auth

Better Auth — framework-agnostic TypeScript authentication & authorization library. Covers setup, email/password, social OAuth (40+ providers), passkeys, magic links, 2FA, organizations, sessions, plugins, admin, hooks, and security hardening. Use when implementing auth with Better Auth: configuring auth instances, adding providers, setting up database adapters (Prisma, Drizzle, PostgreSQL, MySQL, SQLite, MongoDB), integrating with frameworks (Next.js, Nuxt, SvelteKit, Astro, Hono, Express, Elysia, Fastify, Expo), managing sessions, or extending with plugins.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "better-auth" with this command: npx skills add fellipeutaka/leon/fellipeutaka-leon-better-auth

Better Auth

Framework-agnostic TypeScript auth library. Plugin-based architecture, 40+ OAuth providers, 18+ framework integrations.

Quick Start

Install

npm install better-auth

Scoped packages (as needed):

PackageUse case
@better-auth/passkeyWebAuthn/Passkey auth
@better-auth/ssoSAML/OIDC enterprise SSO
@better-auth/stripeStripe payments
@better-auth/expoReact Native/Expo

Environment Variables

BETTER_AUTH_SECRET=<32+ chars, generate: openssl rand -base64 32>
BETTER_AUTH_URL=http://localhost:3000
DATABASE_URL=<connection string>

Server Config (lib/auth.ts)

import { betterAuth } from "better-auth";

export const auth = betterAuth({
  database: process.env.DATABASE_URL,  // or adapter instance
  emailAndPassword: { enabled: true },
  socialProviders: {
    google: {
      clientId: process.env.GOOGLE_CLIENT_ID!,
      clientSecret: process.env.GOOGLE_CLIENT_SECRET!,
    },
  },
  plugins: [], // add plugins here
});

export type Session = typeof auth.$Infer.Session;

Client Config (lib/auth-client.ts)

import { createAuthClient } from "better-auth/react"; // or /vue, /svelte, /solid, /client

export const authClient = createAuthClient({
  plugins: [], // add client plugins here
});

Route Handler

FrameworkFileHandler
Next.js App Routerapp/api/auth/[...all]/route.tstoNextJsHandler(auth) → export { GET, POST }
Next.js Pagespages/api/auth/[...all].tstoNextJsHandler(auth) → default export
Expressanyapp.all("/api/auth/*splat", toNodeHandler(auth))
Honorouteapp.on(["POST","GET"], "/api/auth/**", (c) => auth.handler(c.req.raw))
SvelteKithooks.server.tssvelteKitHandler({ auth, event })
Astropages/api/auth/[...all].tstoAstroHandler(auth)
Elysiapluginnew Elysia().mount(auth.handler)

See references/framework-integrations.md for all frameworks.

CLI Commands

npx @better-auth/cli@latest migrate          # Apply schema (built-in adapter)
npx @better-auth/cli@latest generate          # Generate for Prisma/Drizzle
npx @better-auth/cli@latest generate --output prisma/schema.prisma
npx @better-auth/cli@latest generate --output src/db/auth-schema.ts

Re-run after adding/changing plugins.

Core Concepts

  • Server instance (auth): handles all auth logic, DB, sessions
  • Client instance (authClient): framework-specific hooks (useSession, signIn, signUp, signOut)
  • Plugins: extend both server and client — add endpoints, DB tables, hooks
  • Type inference: auth.$Infer.Session, auth.$Infer.Session.user for full type safety
  • For separate client/server projects: createAuthClient<typeof auth>()

Authentication Methods

MethodPackageConfig/PluginReference
Email/Passwordbuilt-inemailAndPassword: { enabled: true }authentication.md
Social OAuthbuilt-insocialProviders: { google: {...} }authentication.md
Magic Linkbuilt-inmagicLink() pluginauthentication.md
Passkey@better-auth/passkeypasskey() pluginauthentication.md
Usernamebuilt-inusername() pluginauthentication.md
Email OTPbuilt-inemailOtp() pluginauthentication.md
Phone Numberbuilt-inphoneNumber() pluginauthentication.md
Anonymousbuilt-inanonymous() pluginauthentication.md

Plugin Quick Reference

Import from dedicated paths for tree-shaking: import { twoFactor } from "better-auth/plugins/two-factor" NOT from "better-auth/plugins".

PluginServer ImportClient ImportPurpose
twoFactorbetter-auth/plugins/two-factortwoFactorClientTOTP, OTP, backup codes
organizationbetter-auth/plugins/organizationorganizationClientMulti-tenant orgs, teams, RBAC
adminbetter-auth/plugins/adminadminClientUser management, impersonation
passkey@better-auth/passkeypasskeyClientWebAuthn/FIDO2
magicLinkbetter-auth/plugins/magic-linkmagicLinkClientPasswordless email links
emailOtpbetter-auth/plugins/email-otpemailOtpClientEmail one-time passwords
usernamebetter-auth/plugins/usernameusernameClientUsername-based auth
phoneNumberbetter-auth/plugins/phone-numberphoneNumberClientPhone-based auth
anonymousbetter-auth/plugins/anonymousanonymousClientGuest sessions
apiKeybetter-auth/plugins/api-keyapiKeyClientAPI key management
bearerbetter-auth/plugins/bearerBearer token auth
jwtbetter-auth/plugins/jwtjwtClientJWT tokens
multiSessionbetter-auth/plugins/multi-sessionmultiSessionClientMultiple active sessions
oauthProviderbetter-auth/plugins/oauth-providerBecome OAuth provider
oidcProviderbetter-auth/plugins/oidc-providerBecome OIDC provider
sso@better-auth/ssossoClientSAML/OIDC enterprise SSO
openAPIbetter-auth/plugins/open-apiAPI documentation
customSessionbetter-auth/plugins/custom-sessionExtend session data
genericOAuthbetter-auth/plugins/generic-oauthgenericOAuthClientCustom OAuth providers
oneTapbetter-auth/plugins/one-taponeTapClientGoogle One Tap

Pattern: server plugin in auth({ plugins: [...] }) + client plugin in createAuthClient({ plugins: [...] }) + re-run CLI migrations.

See references/plugins.md for detailed usage and custom plugin creation.

Database Setup

AdapterSetup
SQLitePass better-sqlite3 or bun:sqlite instance
PostgreSQLPass pg.Pool instance
MySQLPass mysql2 pool
PrismaprismaAdapter(prisma, { provider: "postgresql" }) from better-auth/adapters/prisma
DrizzledrizzleAdapter(db, { provider: "pg" }) from better-auth/adapters/drizzle
MongoDBmongodbAdapter(db) from better-auth/adapters/mongodb
Connection stringdatabase: process.env.DATABASE_URL (uses built-in Kysely)

Critical: Config uses ORM model name, NOT DB table name. Prisma model User mapping to table users → use modelName: "user".

Core schema tables: user, session, account, verification. Plugins add their own tables.

See references/setup.md for full database setup details.

Session Management

Key options:

session: {
  expiresIn: 60 * 60 * 24 * 7,  // 7 days (default)
  updateAge: 60 * 60 * 24,       // refresh every 24h (default)
  freshAge: 60 * 60 * 24,        // require re-auth after 24h for sensitive ops
  cookieCache: {
    enabled: true,
    maxAge: 300,                  // 5 min
    strategy: "compact",          // "compact" | "jwt" | "jwe"
  },
}
  • secondaryStorage (Redis/KV): sessions go there by default, not DB
  • Stateless mode: no DB + cookieCache = session in cookie only
  • customSession plugin: extend session with custom fields

See references/sessions.md for full session management details.

Security Checklist

DODON'T
Use 32+ char secret with high entropyCommit secrets to version control
Set baseURL with HTTPS in productionDisable CSRF check (disableCSRFCheck)
Configure trustedOrigins for all frontendsDisable origin check
Enable rate limiting (on by default in prod)Use "memory" rate limit storage in serverless
Configure backgroundTasks.handler on serverlessSkip email verification setup
Use "jwe" cookie cache for sensitive session dataStore OAuth tokens unencrypted if used for API calls
Set revokeSessionsOnPasswordReset: trueReturn specific error messages ("user not found")

See references/security.md for complete security hardening guide.

Common Gotchas

  1. Model vs table name — config uses ORM model name, not DB table name
  2. Plugin schema — re-run CLI after adding/changing plugins
  3. Secondary storage — sessions go there by default, not DB. Set session.storeSessionInDatabase: true to persist both
  4. Cookie cache — custom session fields NOT cached, always re-fetched from DB
  5. Callback URLs — always use absolute URLs with origin (not relative paths)
  6. Express v5 — use "/api/auth/*splat" not "/api/auth/*" for catch-all routes
  7. Next.js RSC — add nextCookies() plugin to auth config for server component session access

Troubleshooting

IssueFix
"Secret not set"Add BETTER_AUTH_SECRET env var
"Invalid Origin"Add domain to trustedOrigins
Cookies not settingCheck baseURL matches domain; enable secure cookies in prod
OAuth callback errorsVerify redirect URIs in provider dashboard match exactly
Type errors after adding pluginRe-run CLI generate/migrate
Session null in RSCAdd nextCookies() plugin
2FA redirect not workingAdd twoFactorClient with onTwoFactorRedirect to client

Reference Index

FileWhen to read
setup.mdSetting up new project, configuring DB, route handlers
authentication.mdImplementing any auth method (email, social, passkey, magic link, etc.)
sessions.mdConfiguring session expiry, caching, stateless mode, secondary storage
security.mdHardening for production — rate limiting, CSRF, cookies, OAuth security
plugins.mdUsing or creating plugins, plugin catalog
framework-integrations.mdFramework-specific setup (Next.js, Nuxt, SvelteKit, Hono, Express, etc.)
two-factor.mdImplementing 2FA (TOTP, OTP, backup codes, trusted devices)
organizations.mdMulti-tenant orgs, teams, invitations, RBAC
admin.mdUser management, roles, banning, impersonation
hooks-and-middleware.mdCustom logic via before/after hooks, DB hooks, middleware

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

seo-audit

No summary provided by upstream source.

Repository SourceNeeds Review
General

docker

No summary provided by upstream source.

Repository SourceNeeds Review
General

commit-work

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

clean-code

No summary provided by upstream source.

Repository SourceNeeds Review