Server-Side Rendering
Single-page apps with server-side rendering (SSR) is a popular way to optimize rendering performance and leverage advanced caching strategies.
Supabase Auth supports server-side rendering when you need access to user information, or your server needs to authorize API requests on behalf of your user to render content.
When a user authenticates with Supabase Auth, two pieces of information are issued by the server:
- Access token in the form of a JWT.
- Refresh token which is a randomly generated string.
Most Supabase projects have their auth server listening on <project-ref>.supabase.co/auth/v1
, thus the access token and refresh token are set as sb-access-token
and sb-refresh-token
cookies on the <project-ref>.supabase.co
domain.
note
These cookie names are for internal Supabase use only and may change without warning. They are included in this guide for illustration purposes only.
Web browsers limit access to cookies across domains, consistent with the Same-Origin Policy (SOP).
Your web application cannot access these cookies, nor will these cookies be sent to your application's server.
Understanding the authentication flow#
When you call one of the signIn
methods, the client library running in the browser sends the request to the Supabase Auth server. The Auth server determines whether to verify a phone number, email and password combination, a Magic Link, or use a social login (if you have any setup in your project).
Upon successful verification of the identity of the user, the Supabase Auth server redirects the user back to your single-page app.
tip
You can configure redirects URLs in the Supabase Dashboard. You can use wildcard match patterns like *
and **
to allow redirects to different forms of URLs.
Supabase Auth supports two authentication flows: Implicit and PKCE. The PKCE flow is generally preferred when on the server. It introduces a few additional steps which guard a against replay and URL capture attacks. Unlike the implicit flow, it also allows users to access the access_token
and refresh_token
on the server.
Bringing it together#
As seen from the authentication flow, the initial request after successful login made by the browser to your app's server after user login does not contain any information about the user. This is because first the client-side JavaScript library must run before it makes the access and refresh token available to your server.
It is very important to make sure that the redirect route right after login works without any server-side rendering. Other routes requiring authorization do not have the same limitation, provided you send the access and refresh tokens to your server.
This is traditionally done by setting cookies. Here's an example you can add to the root of your application:
_12supabase.auth.onAuthStateChange((event, session) => {_12 if (event === 'SIGNED_OUT' || event === 'USER_DELETED') {_12 // delete cookies on sign out_12 const expires = new Date(0).toUTCString()_12 document.cookie = `my-access-token=; path=/; expires=${expires}; SameSite=Lax; secure`_12 document.cookie = `my-refresh-token=; path=/; expires=${expires}; SameSite=Lax; secure`_12 } else if (event === 'SIGNED_IN' || event === 'TOKEN_REFRESHED') {_12 const maxAge = 100 * 365 * 24 * 60 * 60 // 100 years, never expires_12 document.cookie = `my-access-token=${session.access_token}; path=/; max-age=${maxAge}; SameSite=Lax; secure`_12 document.cookie = `my-refresh-token=${session.refresh_token}; path=/; max-age=${maxAge}; SameSite=Lax; secure`_12 }_12})
This uses the standard document.cookie
API to set cookies on all paths of your app's domain. All subsequent requests made by the browser to your app's server include the my-access-token
and my-refresh-token
cookies (the names of the cookies and additional parameters can be changed).
In your server-side rendering code you can now access user and session information:
_18const refreshToken = req.cookies['my-refresh-token']_18const accessToken = req.cookies['my-access-token']_18_18if (refreshToken && accessToken) {_18 await supabase.auth.setSession({_18 refresh_token: refreshToken,_18 access_token: accessToken,_18 {_18 auth: { persistSession: false },_18 }_18 })_18} else {_18 // make sure you handle this case!_18 throw new Error('User is not authenticated.')_18}_18_18// returns user information_18await supabase.auth.getUser()
Use setSession({ access_token, refresh_token })
instead of setSession(refreshToken)
or getUser(accessToken)
as refresh tokens or access tokens alone do not properly identify a user session.
Access tokens are valid only for a short amount of time.
Even though refresh tokens are long-lived, there is no guarantee that a user has an active session. They may have logged out and your application failed to remove the my-refresh-token
cookie, or some other failure occurred that left a stale refresh token in the browser. Furthermore, a refresh token can only be used a few seconds after it was first used. Only use a refresh token if the access token is about to expire, which will avoid the introduction of difficult to diagnose logout bugs in your app.
A good practice is to handle unauthorized errors by deferring rendering the page in the browser instead of in the server. Some user information is contained in the access token though, so in certain cases, you may be able to use this potentially stale information to render a page.
Frequently Asked Questions#
No session on the server side with Next.js route prefetching?#
When you use route prefetching in Next.js using <Link href="/...">
components or the Router.push()
APIs can send server-side requests before the browser processes the access and refresh tokens. This means that those requests may not have any cookies set and your server code will render unauthenticated content.
To improve experience for your users, we recommend redirecting users to one specific page after sign-in that does not include any route prefetching from Next.js. Once the Supabase client library running in the browser has obtained the access and refresh tokens from the URL fragment, you can send users to any pages that use prefetching.
How do I make the cookies HttpOnly
?#
This is not necessary. Both the access token and refresh token are designed to be passed around to different components in your application. The browser-based side of your application needs access to the refresh token to properly maintain a browser session anyway.
My server is getting invalid refresh token errors. What's going on?#
It is likely that the refresh token sent from the browser to your server is stale. Make sure the onAuthStateChange
listener callback is free of bugs and is registered relatively early in your application's lifetime
When you receive this error on the server-side, try to defer rendering to the browser where the client library can access an up-to-date refresh token and present the user with a better experience.
Should I set a shorter Max-Age
parameter on the cookies?#
The Max-Age
or Expires
cookie parameters only control whether the browser sends the value to the server. Since a refresh token represents the long-lived authentication session of the user on that browser, setting a short Max-Age
or Expires
parameter on the cookies only results in a degraded user experience.
The only way to ensure that a user has logged out or their session has ended is to get the user's details with getUser()
.
What should I use for the SameSite
property?#
Make sure you understand the behavior of the property in different situations as some properties can degrade the user experience.
A good default is to use Lax
which sends cookies when users are navigating to your site. Cookies typically require the Secure
attribute, which only sends them over HTTPS. However, this can be a problem when developing on localhost
.
Can I use server-side rendering with a CDN or cache?#
Yes, but you need to be careful to include at least the refresh token cookie value in the cache key. Otherwise you may be accidentally serving pages with data belonging to different users!
Also be sure you set proper cache control headers. We recommend invalidating cache keys every hour or less.
Which authentication flows have PKCE support?#
At present, PKCE is supported on the Magic Link, OAuth, Sign Up, and Password Recovery routes. These correspond to the signInWithOtp
, signInWithOAuth
, signUp
, and resetPasswordForEmail
methods on the Supabase client library. When using PKCE with Phone and Email OTPs, there is no behavior change with respect to the implicit flow - an access token will be returned in the body when a request is successful.