Implementing Better Auth
Quick Start
import { betterAuth } from "better-auth";
import { prismaAdapter } from "better-auth/adapters/prisma";
export const auth = betterAuth({
database: prismaAdapter(prisma, { provider: "postgresql" }),
emailAndPassword: { enabled: true, requireEmailVerification: true },
session: { expiresIn: 60 * 60 * 24 * 7 },
socialProviders: {
google: { clientId: process.env.GOOGLE_CLIENT_ID!, clientSecret: process.env.GOOGLE_CLIENT_SECRET! },
},
});
Features
| Feature |
Description |
Reference |
| Email/Password Auth |
Secure registration, login, password validation |
Auth Guide |
| Social OAuth |
Google, GitHub, Discord provider integration |
Social Providers |
| Two-Factor Auth |
TOTP-based MFA with backup codes |
2FA Plugin |
| Session Management |
Secure cookie-based sessions with refresh |
Sessions |
| Rate Limiting |
Configurable limits per endpoint |
Rate Limiting |
| Organizations |
Multi-tenant support with roles |
Organizations Plugin |
Common Patterns
Client Setup with Plugins
import { createAuthClient } from "better-auth/client";
import { twoFactorClient, organizationClient } from "better-auth/client/plugins";
export const authClient = createAuthClient({
baseURL: process.env.NEXT_PUBLIC_API_URL,
plugins: [twoFactorClient(), organizationClient()],
});
export const { signIn, signUp, signOut, useSession } = authClient;
Protected Routes Middleware
import { auth } from "@/lib/auth";
import { NextRequest, NextResponse } from "next/server";
export async function middleware(request: NextRequest) {
const session = await auth.api.getSession({ headers: request.headers });
if (!session && !request.nextUrl.pathname.startsWith("/login")) {
return NextResponse.redirect(new URL("/login", request.url));
}
return NextResponse.next();
}
Two-Factor Authentication Flow
const { data, error } = await authClient.signIn.email({ email, password });
if (error?.code === "TWO_FACTOR_REQUIRED") {
const { data: verified } = await authClient.twoFactor.verify({ code: totpCode });
}
const { data } = await authClient.twoFactor.enable();
Best Practices
| Do |
Avoid |
| Require email verification for new accounts |
Storing plain-text passwords |
| Enable rate limiting on auth endpoints |
Exposing detailed error messages |
| Use httpOnly, secure cookies |
Using predictable session tokens |
| Set strong password requirements (12+ chars) |
Allowing unlimited login attempts |
| Implement proper session expiration |
Storing sensitive data in JWT |
| Log authentication events for auditing |
Skipping CSRF protection |
References