EdgeSpark keeps auth configuration inDocumentation Index
Fetch the complete documentation index at: https://docs.edgespark.dev/llms.txt
Use this file to discover all available pages before exploring further.
configs/auth-config.yaml. This file controls sign-up policy, session behavior, email/password auth, and which OAuth providers are enabled.
Pull, inspect, and apply config
Start from the live project config:configs/auth-config.yaml, then apply it:
edgespark auth get --json when you want the current applied config in machine-readable form.
Typical development flow
When you change auth configuration, use this order:- Run
edgespark auth pullif you want to start from the current live config. - Edit
configs/auth-config.yaml. - If you are enabling a social OAuth provider, prepare the provider app, redirect URLs, client ID var, and secret first.
- Run
edgespark auth apply. - Run
edgespark deployso your app uses the updated auth behavior.
- set the client ID with
edgespark var set ... - set the client secret with
edgespark secret set ... - reference those keys from
configs/auth-config.yaml
Example config
configs/auth-config.yaml
What each section controls
| Field | What it does |
|---|---|
disableSignUp | Turns off new account creation globally |
session.expiresIn | Sets session lifetime in seconds |
session.updateAge | Controls how often active sessions refresh |
session.disableSessionRefresh | Disables automatic session refresh |
providerEmailPassword.enabled | Enables email/password login |
providerEmailPassword.config.* | Controls password length, email verification, and password reset behavior |
provider<Provider>.enabled | Enables an OAuth provider |
provider<Provider>.config | Points the provider at the required client ID and secret inputs |
Keep OAuth values out of the YAML file
For step-by-step walkthroughs of creating the provider OAuth app, entering the callback URL, and storing the client ID and secret for each of Google, GitHub, GitLab, and Discord, see add social OAuth login.configs/auth-config.yaml can reference vars and secrets, but it should not contain sensitive secret values.
For OAuth providers:
| Provider | Client ID var key | Secret key | Extra config |
|---|---|---|---|
GOOGLE_CLIENT_ID | GOOGLE_CLIENT_SECRET | None | |
| GitHub | GITHUB_CLIENT_ID | GITHUB_CLIENT_SECRET | None |
| GitLab | GITLAB_CLIENT_ID | GITLAB_CLIENT_SECRET | None |
| Discord | DISCORD_CLIENT_ID | DISCORD_CLIENT_SECRET | None |
How this affects your frontend
The managed auth UI in@edgespark/web reads the applied config automatically. After you apply and deploy:
- enabled OAuth providers appear automatically
- disabled providers disappear
- sign-up availability follows
disableSignUp - verification and password-reset flows follow the email/password config
Troubleshooting
- If
edgespark auth applyfails, check for unknown fields or wrong fixed ref names such asGOOGLE_CLIENT_SECRET. - If validation errors mention unsupported or newer fields, compare your file against
https://schemas.edgespark.dev/v1/auth-config.schema.jsonand update the CLI withnpm update -g @edgespark/cli. - If a provider is enabled but login still fails, make sure both the var and secret exist in the target environment.
- If the UI still shows old provider settings, deploy after applying the config.
See also
Build auth UI
Use the managed
@edgespark/web auth UI so provider and sign-up settings flow straight from project config.Development workflow
See where auth config fits into the repo-based loop for schema, storage, vars, secrets, and deploys.