Loading...
Loading...
Compare original and translation side by side
BETTER_AUTH_SECRETopenssl rand -base64 32BETTER_AUTH_URLhttps://example.combaseURLsecretBETTER_AUTH_SECRETopenssl rand -base64 32BETTER_AUTH_URLhttps://example.combaseURLsecretauth.ts././lib./utils./src--configauth.ts././lib./utils./src--confignpx @better-auth/cli@latest migratenpx @better-auth/cli@latest generatenpx @better-auth/cli mcp --cursornpx @better-auth/cli@latest migratenpx @better-auth/cli@latest generatenpx @better-auth/cli mcp --cursor| Option | Notes |
|---|---|
| Optional display name |
| Only if |
| Default |
| Only if |
| Required for most features. See adapters docs. |
| Redis/KV for sessions & rate limits |
| |
| |
| Array of plugins |
| CSRF whitelist |
| 选项 | 说明 |
|---|---|
| 可选的显示名称 |
| 仅当未设置 |
| 默认值为 |
| 仅当未设置 |
| 大多数功能都需要配置。请查看适配器文档。 |
| 用于会话和速率限制的Redis/KV存储 |
| 设置 |
| 配置格式: |
| 插件数组 |
| CSRF白名单 |
pg.Poolmysql2better-sqlite3bun:sqlitebetter-auth/adapters/drizzlebetter-auth/adapters/prismabetter-auth/adapters/mongodbUserusersmodelName: "user""users"pg.Poolmysql2better-sqlite3bun:sqlitebetter-auth/adapters/drizzlebetter-auth/adapters/prismabetter-auth/adapters/mongodbUserusersmodelName: "user""users"secondaryStoragesession.storeSessionInDatabase: truecookieCachecompactjwtjwesession.expiresInsession.updateAgesession.cookieCache.maxAgesession.cookieCache.versionsecondaryStoragesession.storeSessionInDatabase: truecookieCachecompactjwtjwesession.expiresInsession.updateAgesession.cookieCache.maxAgesession.cookieCache.versionuser.modelNameuser.fieldsuser.additionalFieldsuser.changeEmail.enableduser.deleteUser.enabledaccount.modelNameaccount.accountLinking.enabledaccount.storeAccountCookieemailnameuser.modelNameuser.fieldsuser.additionalFieldsuser.changeEmail.enableduser.deleteUser.enabledaccount.modelNameaccount.accountLinking.enabledaccount.storeAccountCookieemailnameemailVerification.sendVerificationEmailemailVerification.sendOnSignUpsendOnSignInemailAndPassword.sendResetPasswordemailVerification.sendVerificationEmailemailVerification.sendOnSignUpsendOnSignInemailAndPassword.sendResetPasswordadvanceduseSecureCookiesdisableCSRFCheckdisableOriginCheckcrossSubDomainCookies.enabledipAddress.ipAddressHeadersdatabase.generateId"serial""uuid"falserateLimit.enabledrateLimit.windowrateLimit.maxrateLimit.storageadvanceduseSecureCookiesdisableCSRFCheckdisableOriginCheckcrossSubDomainCookies.enabledipAddress.ipAddressHeadersdatabase.generateId"serial""uuid"falserateLimit.enabledrateLimit.windowrateLimit.maxrateLimit.storagehooks.beforehooks.after{ matcher, handler }createAuthMiddlewarectx.pathctx.context.returnedctx.context.sessiondatabaseHooks.user.create.before/aftersessionaccountctx.contextsessionsecretauthCookiespassword.hash()verify()adapterinternalAdaptergenerateId()tablesbaseURLhooks.beforehooks.after{ matcher, handler }createAuthMiddlewarectx.pathctx.context.returnedctx.context.sessiondatabaseHooks.user.create.before/afterctx.contextsessionsecretauthCookiespassword.hash()verify()adapterinternalAdaptergenerateId()tablesbaseURLimport { twoFactor } from "better-auth/plugins/two-factor"from "better-auth/plugins"twoFactororganizationpasskeymagicLinkemailOtpusernamephoneNumberadminapiKeybearerjwtmultiSessionssooauthProvideroidcProvideropenAPIgenericOAuthcreateAuthClient({ plugins: [...] })import { twoFactor } from "better-auth/plugins/two-factor""better-auth/plugins"twoFactororganizationpasskeymagicLinkemailOtpusernamephoneNumberadminapiKeybearerjwtmultiSessionssooauthProvideroidcProvideropenAPIgenericOAuthcreateAuthClient({ plugins: [...] })better-auth/clientbetter-auth/reactbetter-auth/vuebetter-auth/sveltebetter-auth/solidsignUp.email()signIn.email()signIn.social()signOut()useSession()getSession()revokeSession()revokeSessions()better-auth/clientbetter-auth/reactbetter-auth/vuebetter-auth/sveltebetter-auth/solidsignUp.email()signIn.email()signIn.social()signOut()useSession()getSession()revokeSession()revokeSessions()typeof auth.$Infer.Sessiontypeof auth.$Infer.Session.usercreateAuthClient<typeof auth>()typeof auth.$Infer.Sessiontypeof auth.$Infer.Session.usercreateAuthClient<typeof auth>()