vtex-io-auth-tokens-and-context
Auth Tokens & Request Context
When this skill applies
Use this skill when the main decision is which VTEX IO identity should authenticate a backend request to VTEX services.
- Choosing between
ctx.authToken,ctx.storeUserAuthToken, andctx.adminUserAuthToken - Deciding whether a VTEX client call should use
AUTH_TOKEN,STORE_TOKEN, orADMIN_TOKEN - Reviewing storefront and Admin integrations that should respect the current user identity
- Replacing hardcoded
appKeyandappTokenusage inside a VTEX IO app
Do not use this skill for:
- deciding which policies belong in
manifest.json - modeling route-level authorization or resource-based policies
- choosing between
ExternalClient,JanusClient, and other client abstractions - browser-side login or session UX flows
- validating route input or deciding what data may cross the app boundary
Decision rules
- Use this skill to decide which identity talks to VTEX endpoints, not what that identity is authorized to do.
- Use
AUTH_TOKENwithctx.authTokenonly for app-level operations that are not tied to a current shopper or Admin user. - Use
STORE_TOKENwithctx.storeUserAuthTokenwhenever the action comes from storefront browsing or a shopper-triggered flow and the integration should respect shopper permissions. - Use
ADMIN_TOKENwithctx.adminUserAuthTokenwhenever the action comes from an Admin interface and the integration should respect the logged-in Admin user's License Manager permissions. - Prefer user tokens whenever they are available. The official guidance is to avoid app-token authentication when a store or Admin user token can represent the requester more accurately.
- If the corresponding user token is not present, fall back to
AUTH_TOKENonly when the operation is truly app-scoped and does not depend on a current shopper or Admin identity. - When using VTEX IO clients that accept
authMethod, pass the token choice explicitly when the default app identity is not the right one for the request. - When wrapping custom VTEX clients, propagate the matching auth token from
IOContextat the client boundary instead of hardcoding credentials in handlers. - Keep token choice aligned with the user journey: storefront flows should not silently escalate to app-level permissions, and Admin flows should not bypass the current Admin role context.
ADMIN_TOKENwithctx.adminUserAuthTokenmust remain server-side only and must never be exposed or proxied to browser clients.- Treat token choice and policy design as separate concerns: this skill decides which identity is making the call, while auth-and-policies decides what that identity is allowed to do.
- Do not use
appKeyandappTokeninside a VTEX IO app unless there is a documented exception outside the normal VTEX IO auth-token model. - Never log raw tokens or return them in responses. Tokens are request secrets, and downstream callers should receive only business data.
Token selection at a glance:
| Token | Context field | Use when | Avoid when |
|---|---|---|---|
AUTH_TOKEN |
ctx.authToken |
app-level jobs, service-to-service work, or operations not linked to a current user | a shopper or Admin user is already driving the action |
STORE_TOKEN |
ctx.storeUserAuthToken |
storefront and shopper-triggered operations | backend jobs or Admin-only operations |
ADMIN_TOKEN |
ctx.adminUserAuthToken |
Admin requests that must respect the current user's LM role | storefront flows or background app tasks |
Hard constraints
Constraint: User-driven requests must prefer user tokens over the app token
If a request is initiated by a current shopper or Admin user, the VTEX integration MUST use the corresponding user token instead of defaulting to the app token.
Why this matters
Using the app token for user-driven work widens permissions unnecessarily and disconnects the request from the real user context that should govern access.
Detection
If the code runs in a storefront or Admin request path and still uses ctx.authToken or implicit app-token behavior, STOP and verify whether ctx.storeUserAuthToken or ctx.adminUserAuthToken should be used instead.
Correct
export class OmsClient extends JanusClient {
constructor(ctx: IOContext, options?: InstanceOptions) {
super(ctx, {
...options,
headers: {
...options?.headers,
VtexIdclientAutCookie: ctx.storeUserAuthToken,
},
})
}
}
Wrong
export class OmsClient extends JanusClient {
constructor(ctx: IOContext, options?: InstanceOptions) {
super(ctx, {
...options,
headers: {
...options?.headers,
VtexIdclientAutCookie: ctx.authToken,
},
})
}
}
Constraint: App tokens must be reserved for app-level operations that are not tied to a user
Use ctx.authToken only when the request is genuinely app-scoped and no current shopper or Admin identity should govern the action.
Why this matters
The app token carries the permissions declared in the app manifest. Using it for user-triggered actions can bypass the narrower shopper or Admin permission model that the platform expects.
Detection
If a request originates from an Admin page, storefront interaction, or another user-facing workflow, STOP before using ctx.authToken and confirm that the action is truly app-level rather than user-scoped.
Correct
export class RatesAndBenefitsClient extends JanusClient {
constructor(ctx: IOContext, options?: InstanceOptions) {
super(ctx, {
...options,
headers: {
...options?.headers,
VtexIdclientAutCookie: ctx.authToken,
},
})
}
}
Wrong
export class AdminOrdersClient extends JanusClient {
constructor(ctx: IOContext, options?: InstanceOptions) {
super(ctx, {
...options,
headers: {
...options?.headers,
VtexIdclientAutCookie: ctx.authToken,
},
})
}
}
This is wrong when the client is used from an Admin flow that should respect the logged-in user's role.
Constraint: VTEX IO apps must not hardcode VTEX API credentials when auth tokens are available
A VTEX IO app MUST use tokens from IOContext or authMethod instead of embedding appKey, appToken, or static VTEX credentials in source code or routine runtime configuration.
Why this matters
Hardcoded VTEX credentials are harder to rotate, easier to leak, and bypass the request-context model that VTEX IO clients already support.
Detection
If you see X-VTEX-API-AppKey, X-VTEX-API-AppToken, raw VTEX API credentials, or environment variables carrying permanent VTEX credentials inside a normal IO app integration, STOP and replace them with the correct auth-token flow unless there is a documented exception.
Correct
await ctx.clients.catalog.getSkuById(id, {
authMethod: 'ADMIN_TOKEN',
})
Wrong
await fetch(`https://${ctx.vtex.account}.myvtex.com/api/catalog/pvt/stockkeepingunit/${id}`, {
headers: {
'X-VTEX-API-AppKey': process.env.VTEX_APP_KEY!,
'X-VTEX-API-AppToken': process.env.VTEX_APP_TOKEN!,
},
})
Preferred pattern
Start from the requester context, choose the token identity that matches that requester, and keep the token propagation inside the client layer.
Minimal selection guide:
storefront request -> STORE_TOKEN / ctx.storeUserAuthToken
admin request -> ADMIN_TOKEN / ctx.adminUserAuthToken
background app work -> AUTH_TOKEN / ctx.authToken
Pass the token explicitly when the client supports authMethod:
await ctx.clients.orders.listOrders({
authMethod: 'ADMIN_TOKEN',
})
await ctx.clients.orders.listOrders({
authMethod: 'STORE_TOKEN',
})
Or inject the matching token in a custom VTEX client:
import type { IOContext, InstanceOptions } from '@vtex/api'
import { JanusClient } from '@vtex/api'
export class OmsClient extends JanusClient {
constructor(ctx: IOContext, options?: InstanceOptions) {
super(ctx, {
...options,
headers: {
...options?.headers,
VtexIdclientAutCookie: ctx.adminUserAuthToken,
},
})
}
}
Keep the decision close to the request boundary, then let downstream handlers and services depend on the correctly configured client rather than choosing tokens ad hoc in many places.
Common failure modes
- Defaulting every VTEX request to
ctx.authToken, even when a shopper or Admin user initiated the action. - Using
ctx.authTokenin Admin pages and accidentally bypassing the current Admin user's License Manager role context. - Using
ctx.authTokenin storefront flows that should be limited by shopper permissions. - Hardcoding
appKeyandappTokenin an IO app instead of using auth tokens fromIOContext. - Choosing the right token in one client method but forgetting to apply the same identity consistently across related calls.
- Mixing token choice with policy modeling and treating them as the same decision.
- Logging
ctx.authToken,ctx.storeUserAuthToken, orctx.adminUserAuthTokenin plain text, or forwarding raw tokens to downstream services that do not need them.
Review checklist
- Does each VTEX integration use the correct requester identity: shopper, Admin user, or app?
- Are
ctx.storeUserAuthTokenandctx.adminUserAuthTokenpreferred when a user is actually driving the action? - Is
ctx.authTokenused only for app-level operations that are not tied to a current user? - Are hardcoded VTEX credentials absent from normal IO app integrations?
- Is token propagation centralized in the client layer or explicit
authMethodusage rather than scattered across handlers?
Related skills
vtex-io-auth-and-policies- Use when the main choice is which permissions and policies the chosen identity should carry
Reference
- App authentication using auth tokens - Official token model for
AUTH_TOKEN,STORE_TOKEN, andADMIN_TOKEN - Using VTEX IO clients - Client usage patterns that complement token selection
- Policies - How app-token permissions relate to manifest-declared policies