better-auth

Better Auth Integration Guide

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "better-auth" with this command: npx skills add giuseppe-trisciuoglio/developer-kit/giuseppe-trisciuoglio-developer-kit-better-auth

Better Auth Integration Guide

Overview

Better Auth is a comprehensive authentication framework for TypeScript that provides type-safe authentication with support for multiple providers, 2FA, SSO, organizations, and more. This skill covers complete integration patterns for NestJS backend with Drizzle ORM and PostgreSQL, plus Next.js App Router frontend integration.

When to Use

  • Setting up Better Auth with NestJS backend

  • Integrating Next.js App Router frontend with Better Auth

  • Configuring Drizzle ORM schema with PostgreSQL for authentication

  • Implementing social login (GitHub, Google, Facebook, Microsoft, etc.)

  • Adding Multi-Factor Authentication (MFA/2FA) with TOTP

  • Implementing passkey (WebAuthn) passwordless authentication

  • Managing trusted devices for streamlined authentication

  • Using backup codes for 2FA account recovery

  • Adding authentication plugins (2FA, Organization, SSO, Magic Link, Passkey)

  • Email/password authentication with secure session management

  • Creating protected routes and authentication middleware

  • Implementing role-based access control (RBAC)

  • Building multi-tenant applications with organizations

Quick Start

Installation

Backend (NestJS)

npm install better-auth @auth/drizzle-adapter npm install drizzle-orm pg npm install -D drizzle-kit

Frontend (Next.js)

npm install better-auth

Basic Setup

  • Configure Better Auth instance (backend)

  • Set up Drizzle schema with Better Auth tables

  • Create auth module in NestJS

  • Configure Next.js auth client

  • Set up middleware for protected routes

See References/ for detailed setup instructions.

Architecture

Backend (NestJS)

src/ ├── auth/ │ ├── auth.module.ts # Auth module configuration │ ├── auth.controller.ts # Auth HTTP endpoints │ ├── auth.service.ts # Business logic │ ├── auth.guard.ts # Route protection │ └── schema.ts # Drizzle auth schema ├── database/ │ ├── database.module.ts # Database module │ └── database.service.ts # Drizzle connection └── main.ts

Frontend (Next.js)

app/ ├── (auth)/ │ ├── sign-in/ │ │ └── page.tsx # Sign in page │ └── sign-up/ │ └── page.tsx # Sign up page ├── (dashboard)/ │ ├── dashboard/ │ │ └── page.tsx # Protected page │ └── layout.tsx # With auth check ├── api/ │ └── auth/ │ └── [...auth]/route.ts # Auth API route ├── layout.tsx # Root layout └── middleware.ts # Auth middleware lib/ ├── auth.ts # Better Auth client └── utils.ts

Instructions

Phase 1: Database Setup

Install Dependencies

npm install drizzle-orm pg @auth/drizzle-adapter better-auth npm install -D drizzle-kit

Configure Drizzle

  • Create drizzle.config.ts

  • Set up database connection

  • Define schema with Better Auth tables

Generate and Run Migrations

npx drizzle-kit generate npx drizzle-kit migrate

Phase 2: Backend Setup (NestJS)

Create Database Module

  • Set up Drizzle connection

  • Provide database service

Configure Better Auth

  • Create auth instance with Drizzle adapter

  • Configure providers (GitHub, Google, etc.)

  • Set up session management

Create Auth Module

  • Auth controller with endpoints

  • Auth service with business logic

  • Auth guard for protection

Phase 3: Frontend Setup (Next.js)

Configure Auth Client

  • Set up Better Auth client

  • Configure server actions

Create Auth Pages

  • Sign in page

  • Sign up page

  • Error handling

Add Middleware

  • Protect routes

  • Handle redirects

Phase 4: Advanced Features

Social Providers

  • Configure OAuth apps

  • Add provider callbacks

Plugins

  • Two-Factor Authentication (2FA)

  • Organizations

  • SSO

  • Magic Links

  • Passkeys

Examples

Example 1: Complete NestJS Auth Setup

Input: Developer needs to set up Better Auth in a new NestJS project with PostgreSQL.

Process:

// 1. Create auth instance export const auth = betterAuth({ database: drizzleAdapter(db, { provider: "pg", schema: { ...schema } }), socialProviders: { github: { clientId: process.env.GITHUB_CLIENT_ID!, clientSecret: process.env.GITHUB_CLIENT_SECRET!, } } });

// 2. Create auth controller @Controller('auth') export class AuthController { @All('*') async handleAuth(@Req() req: Request, @Res() res: Response) { return auth.handler(req); } }

Output: Fully functional auth endpoints at /auth/* with GitHub OAuth support.

Example 2: Next.js Middleware for Route Protection

Input: Protect dashboard routes in Next.js App Router.

Process:

// middleware.ts import { auth } from '@/lib/auth';

export default auth((req) => { if (!req.auth && req.nextUrl.pathname.startsWith('/dashboard')) { const newUrl = new URL('/sign-in', req.nextUrl.origin); return Response.redirect(newUrl); } });

export const config = { matcher: ['/dashboard/:path*', '/api/protected/:path*'] };

Output: Unauthenticated users are redirected to /sign-in when accessing /dashboard/* .

Example 3: Server Component with Session

Input: Display user data in a Next.js Server Component.

Process:

// app/dashboard/page.tsx import { auth } from '@/lib/auth'; import { redirect } from 'next/navigation';

export default async function DashboardPage() { const session = await auth();

if (!session) { redirect('/sign-in'); }

return ( <div> <h1>Welcome, {session.user.name}</h1> <p>Email: {session.user.email}</p> </div> ); }

Output: Renders user information only for authenticated users, redirects others to sign-in.

Example 4: Adding Two-Factor Authentication

Input: Enable 2FA for enhanced account security.

Process:

// Enable 2FA plugin export const auth = betterAuth({ plugins: [ twoFactor({ issuer: 'MyApp', otpOptions: { digits: 6, period: 30 } }) ] });

// Client-side enable 2FA const { data, error } = await authClient.twoFactor.enable({ password: 'user-password' });

Output: Users can enable TOTP-based 2FA and verify with authenticator apps.

Example 5: TOTP Verification with Trusted Device

Input: User has enabled 2FA and wants to sign in, marking the device as trusted.

Process:

// Server-side: Configure 2FA with OTP sending export const auth = betterAuth({ plugins: [ twoFactor({ issuer: 'MyApp', otpOptions: { async sendOTP({ user, otp }, ctx) { // Send OTP via email, SMS, or other method await sendEmail({ to: user.email, subject: 'Your verification code', body: Code: ${otp} }); } } }) ] });

// Client-side: Verify TOTP and trust device const verify2FA = async (code: string) => { const { data, error } = await authClient.twoFactor.verifyTotp({ code, trustDevice: true // Device trusted for 30 days });

if (data) { // Redirect to dashboard router.push('/dashboard'); } };

Output: User is authenticated, device is trusted for 30 days (no 2FA prompt on next sign-ins).

Example 6: Passkey Authentication Setup

Input: Enable passkey (WebAuthn) authentication for passwordless login.

Process:

// Server-side: Configure passkey plugin import { passkey } from '@better-auth/passkey';

export const auth = betterAuth({ plugins: [ passkey({ rpID: 'example.com', // Relying Party ID (your domain) rpName: 'My App', // Display name advanced: { webAuthnChallengeCookie: 'my-app-passkey' } }) ] });

// Client-side: Register passkey const registerPasskey = async () => { const { data, error } = await authClient.passkey.register({ name: 'My Device' });

if (data) { console.log('Passkey registered successfully'); } };

// Client-side: Sign in with passkey const signInWithPasskey = async () => { await authClient.signIn.passkey({ autoFill: true, // Enable conditional UI fetchOptions: { onSuccess() { router.push('/dashboard'); } } }); };

Output: Users can register and authenticate with passkeys (biometric, PIN, or security key).

Example 7: Passkey Conditional UI (Autofill)

Input: Implement passkey autofill in sign-in form for seamless authentication.

Process:

// Component with conditional UI support 'use client';

import { useEffect } from 'react'; import { authClient } from '@/lib/auth/client';

export default function SignInPage() { useEffect(() => { // Check for conditional mediation support if (!PublicKeyCredential.isConditionalMediationAvailable || !PublicKeyCredential.isConditionalMediationAvailable()) { return; }

// Enable passkey autofill
void authClient.signIn.passkey({ autoFill: true });

}, []);

return ( <form> <label htmlFor="email">Email:</label> <input type="email" name="email" autoComplete="username webauthn" /> <label htmlFor="password">Password:</label> <input type="password" name="password" autoComplete="current-password webauthn" /> <button type="submit">Sign In</button> </form> ); }

Output: Browser automatically suggests passkeys when user focuses on input fields.

Example 8: Backup Codes for 2FA Recovery

Input: User needs backup codes to recover account if authenticator app is lost.

Process:

// Enable 2FA - backup codes are generated automatically const enable2FA = async (password: string) => { const { data, error } = await authClient.twoFactor.enable({ password });

if (data) { // IMPORTANT: Display backup codes to user immediately console.log('Backup codes (save these securely):'); data.backupCodes.forEach((code: string) => { console.log(code); });

// Show TOTP URI as QR code
const qrCodeUrl = data.totpURI;
displayQRCode(qrCodeUrl);

} };

// Recover with backup code const recoverWithBackupCode = async (code: string) => { const { data, error } = await authClient.twoFactor.verifyBackupCode({ code });

if (data) { // Allow user to disable 2FA or set up new authenticator router.push('/settings/2fa'); } };

Output: User receives single-use backup codes for account recovery.

Common Patterns

Protected Route Pattern

// NestJS Guard @Controller('dashboard') @UseGuards(AuthGuard) export class DashboardController { @Get() getDashboard(@Request() req) { return req.user; } }

// Next.js Server Component import { auth } from '@/lib/auth'; import { redirect } from 'next/navigation';

export default async function Dashboard() { const session = await auth(); if (!session) { redirect('/sign-in'); } return <div>Welcome {session.user.name}</div>; }

Session Management Pattern

// Get session in API route const session = await auth.api.getSession({ headers: await headers() });

// Get session in Server Component const session = await auth();

// Get session in Client Component 'use client'; import { useSession } from '@/lib/auth/client'; const { data: session } = useSession();

Best Practices

Environment Variables: Always use environment variables for sensitive data (secrets, database URLs, OAuth credentials)

Secret Generation: Use strong, unique secrets for Better Auth. Generate with openssl rand -base64 32

HTTPS Required: OAuth callbacks require HTTPS in production. Use ngrok or similar for local testing

Session Security: Configure appropriate session expiration times based on your security requirements

Database Indexing: Add indexes on frequently queried fields (email, userId) for performance

Error Handling: Implement proper error handling for auth failures without revealing sensitive information

Rate Limiting: Add rate limiting to auth endpoints to prevent brute force attacks

CSRF Protection: Better Auth includes CSRF protection. Always use the provided methods for state changes

Type Safety: Leverage TypeScript types from Better Auth for full type safety across frontend and backend

Testing: Test auth flows thoroughly including success cases, error cases, and edge conditions

Constraints and Warnings

Security Notes

  • Never commit secrets: Add .env to .gitignore and never commit OAuth secrets or database credentials

  • Validate redirect URLs: Always validate OAuth redirect URLs to prevent open redirects

  • Hash passwords: Better Auth handles password hashing automatically. Never implement your own

  • Session storage: For production, use Redis or another scalable session store

  • HTTPS Only: Always use HTTPS for authentication in production

  • OAuth Secrets: Keep OAuth client secrets secure. Rotate them periodically

  • Email Verification: Always implement email verification for password-based auth

Known Limitations

  • Better Auth requires Node.js 18+ for Next.js App Router support

  • Some OAuth providers require specific redirect URL formats

  • Passkeys require HTTPS and compatible browsers

  • Organization features require additional database tables

Version Requirements

Backend Dependencies

{ "dependencies": { "better-auth": "^1.2.0", "@auth/drizzle-adapter": "^1.0.0", "drizzle-orm": "^0.35.0", "pg": "^8.12.0", "@nestjs/common": "^10.0.0", "@nestjs/core": "^10.0.0", "@nestjs/config": "^3.0.0" }, "devDependencies": { "drizzle-kit": "^0.24.0", "@types/pg": "^8.11.0" } }

Frontend Dependencies

{ "dependencies": { "better-auth": "^1.2.0", "next": "^15.0.0", "react": "^19.0.0", "react-dom": "^19.0.0" } }

Database

  • PostgreSQL 14+ recommended

  • For local development: Docker PostgreSQL or Postgres.app

Troubleshooting

  1. "Session not found" errors

Problem: Session data is not being persisted or retrieved correctly.

Solution:

  • Verify database connection is working

  • Check session table exists and has data

  • Ensure BETTER_AUTH_SECRET is set consistently

  • Verify cookie domain settings match your application domain

  1. OAuth callback fails with "Invalid state"

Problem: OAuth state mismatch during callback.

Solution:

  • Clear cookies and try again

  • Ensure BETTER_AUTH_URL is set correctly in environment

  • Check that redirect URI in OAuth app matches exactly

  • Verify no reverse proxy is modifying callbacks

  1. TypeScript type errors with auth()

Problem: Type inference not working correctly.

Solution:

  • Ensure TypeScript 5+ is installed

  • Use npx better-auth typegen to generate types

  • Restart TypeScript server in your IDE

  • Check that better-auth versions match on frontend and backend

  1. Migration fails with "table already exists"

Problem: Drizzle migration conflicts.

Solution:

  • Drop existing tables and re-run migration

  • Or use drizzle-kit push for development

  • For production, write manual migration to handle existing tables

  1. CORS errors from frontend to backend

Problem: Frontend cannot communicate with backend auth endpoints.

Solution:

  • Configure CORS in NestJS backend

  • Add frontend origin to allowed origins

  • Ensure credentials are included: credentials: 'include'

  1. Social provider returns "redirect_uri_mismatch"

Problem: OAuth app configuration mismatch.

Solution:

  • Update OAuth app with exact callback URL

  • Include both http://localhost and production URLs

  • For ngrok/local testing, update OAuth app each time URL changes

Resources

Documentation

  • Better Auth Documentation

  • Drizzle ORM Documentation

  • NestJS Documentation

  • Next.js App Router Documentation

Reference Implementations

  • See references/nestjs-setup.md for complete NestJS setup

  • See references/nextjs-setup.md for complete Next.js setup

  • See references/plugins.md for plugin configuration

  • See assets/ for example code files

Environment Variables

See Assets/env.example for all required environment variables.

Environment Variables

Database

DATABASE_URL=postgresql://user:password@localhost:5432/dbname

Better Auth

BETTER_AUTH_SECRET=your-secret-key-min-32-chars BETTER_AUTH_URL=http://localhost:3000

OAuth Providers

AUTH_GITHUB_CLIENT_ID=your-github-client-id AUTH_GITHUB_CLIENT_SECRET=your-github-client-secret

AUTH_GOOGLE_CLIENT_ID=your-google-client-id AUTH_GOOGLE_CLIENT_SECRET=your-google-client-secret

Email (for magic links and verification)

SMTP_HOST=smtp.example.com SMTP_PORT=587 SMTP_USER=your-smtp-user SMTP_PASSWORD=your-smtp-password SMTP_FROM=noreply@example.com

Session (optional, for Redis)

REDIS_URL=redis://localhost:6379

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Coding

shadcn-ui

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

tailwind-css-patterns

No summary provided by upstream source.

Repository SourceNeeds Review
Coding

unit-test-bean-validation

No summary provided by upstream source.

Repository SourceNeeds Review