Authentication
Authentication verifies the identity of the user interacting with your storefront. Commerce Engine uses a robust token-based system (JWT) and offers flexible login methods, including passwordless options via Email, Phone, and WhatsApp.
Overview
- Tokens: Authentication relies on Access Tokens and Refresh Tokens.
- Access Token: A short-lived Bearer token sent in the
Authorization
header of most API requests. It proves the user’s identity for a limited time. - Refresh Token: A longer-lived token used only to request a new Access Token when the current one expires. It should be stored securely and used less frequently.
- Access Token: A short-lived Bearer token sent in the
- User States:
- Anonymous User: A user who hasn’t logged in or registered. They get tokens via
POST /auth/anonymous
(using theX-Api-Key
). These tokens allow basic browsing, cart management, and crucially, enable server-side analytics tracking from the start. - Logged-in User: A user who has verified their identity via OTP (Email, Phone, WhatsApp) or potentially a password. They receive new, more privileged Access and Refresh tokens upon successful verification. These tokens grant access to sensitive endpoints like order history, address book, etc.
- Anonymous User: A user who hasn’t logged in or registered. They get tokens via
- Security: Always transmit tokens over HTTPS. Store tokens securely on the client (e.g., HttpOnly cookies for web, secure storage for mobile). Never expose your
X-Api-Key
in frontend code.
Anonymous Authentication
As shown in Getting Started, this is the first step for any new visitor to your storefront.
Endpoint: POST /auth/anonymous
Authentication: Requires X-Api-Key
header.
Purpose:
- Assigns a unique
user.id
to track the visitor immediately. - Provides initial
access_token
andrefresh_token
for the session. - Enables automatic server-side analytics event tracking for the user’s actions (viewing products, adding to cart, etc.) right from the start.
Flow:
Using the Anonymous Token: Include the received access_token
as a Bearer token in the Authorization
header for subsequent API calls, like fetching products:
Passwordless Login & Registration
Commerce Engine prioritizes frictionless login experiences using One-Time Passwords (OTPs) sent via Email, Phone, or WhatsApp. This flow also seamlessly handles registration for new users.
Key Feature: register_if_not_exists
When initiating a login (POST /auth/login/*
), you can include the flag "register_if_not_exists": true
in the request body.
- If the user exists: An OTP is sent for login verification.
- If the user does not exist: Commerce Engine automatically creates a basic user record associated with the provided email/phone and sends an OTP for verification and implicit registration.
This eliminates the need for users to guess if they have an account and removes the requirement for separate “Login” vs. “Sign Up” flows or distinct “Guest Checkout” paths. Every user starts the same way.
The Flow (Email/Phone/WhatsApp):
-
Initiate Login: The user provides their email address, phone number, or WhatsApp number. Your application calls the corresponding login endpoint:
POST /auth/login/email
(Body:{ "email": "...", "register_if_not_exists": true }
)POST /auth/login/phone
(Body:{ "phone": "...", "country_code": "+91", "register_if_not_exists": true }
)POST /auth/login/whatsapp
(Body:{ "phone": "...", "country_code": "+91", "register_if_not_exists": true }
) Authentication: Requires a valid (anonymous or logged-in)Bearer
token.
-
Receive OTP Token: Commerce Engine sends an OTP to the specified channel and responds to your app with:
otp_token
: A temporary token associated with this specific OTP verification attempt.otp_action
: Confirms the context (usuallylogin
or potentiallyregister
).
-
User Enters OTP: Display an input field for the user to enter the OTP they received.
-
Verify OTP: Send the user-entered OTP and the
otp_token
back to Commerce Engine:-
POST /auth/verify-otp
-
Body:
Authentication: Requires a valid (anonymous or logged-in)
Bearer
token. -
-
Login Success & New Tokens: If the OTP is correct, Commerce Engine verifies the user (or completes the registration) and responds with:
- Crucially: You receive a new
access_token
andrefresh_token
. These tokens are associated with the now logged-in user and have higher privileges than the initial anonymous tokens. - Replace the old (anonymous) tokens in your secure storage with these new ones.
- The
user
object now contains the details of the logged-in user.is_anonymous
isfalse
, andis_logged_in
istrue
.
- Crucially: You receive a new
Passwordless Login/Registration Flow Diagram:
Updating User Profile:
If a user signs up using only their email/phone via the register_if_not_exists
flow, their first_name
and last_name
might be null. You can allow them to update their profile later using:
- Endpoint:
PUT /auth/user/{id}
- Authentication: Requires a logged-in user’s
Bearer
token. - Path Parameter:
{id}
is theuser.id
obtained during login/verification. - Request Body: Send the fields to update (e.g.,
first_name
,last_name
). See theUser
schema.
Other Authentication Endpoints
While passwordless is recommended, Commerce Engine provides other endpoints for different scenarios:
- Generate OTP (
POST /auth/generate-otp
): Useful if you need to trigger OTP generation outside the main login flow (e.g., verifying a phone number added to a profile). Specify thechannel
(sms, email, whatsapp) andotp_action
(e.g.,verify-phone
,update-email
). Requires a bearer token. - Check Verification Status (
POST /auth/verified-email-phone
): Check if specific emails or phone numbers are already marked as verified in the system. Requires a bearer token. - Password Login (
POST /auth/login/password
): Allows login using email/phone and password. Returns new tokens on success. Requires a bearer token (can be anonymous). - Change Password (
POST /auth/change-password
): For logged-in users to change their password. Requiresold_password
,new_password
,confirm_password
. Requires a logged-in bearer token. - Forgot Password (
POST /auth/forgot-password
): Initiates the password reset flow, sending an OTP. Requires email or phone. Requires a bearer token (can be anonymous). Responds with anotp_token
. - Reset Password (
POST /auth/reset-password
): Completes the password reset using theotp_token
from the forgot password flow and thenew_password
. Requires a bearer token (can be anonymous). Returns new tokens on success.
Token Management
Properly managing Access and Refresh tokens is vital for security and user experience.
-
Storage:
- Web: Store tokens securely. HttpOnly cookies are often recommended as they are not accessible via client-side JavaScript, mitigating XSS risks. Alternatively, use browser storage (localStorage/sessionStorage) but be mindful of XSS vulnerabilities.
- Mobile: Use the platform’s secure storage mechanisms (Keychain on iOS, Keystore/EncryptedSharedPreferences on Android).
- Never store tokens insecurely (e.g., plain localStorage without XSS protection).
-
Using Access Tokens: Include the
access_token
in theAuthorization: Bearer <token>
header for all API calls (exceptPOST /auth/anonymous
). -
Handling Expiry & Refreshing: Access tokens are short-lived (e.g., 15 minutes, 1 hour - the exact duration is configured in Commerce Engine).
-
Proactive Refresh: Decode the access token (the payload is not encrypted) to check its expiry time (
exp
claim). Before it expires, use therefresh_token
to get a new pair of tokens. -
Reactive Refresh: If an API call returns a
401 Unauthorized
error, it likely means the access token expired. Use therefresh_token
to get a new pair, then retry the original API call with the newaccess_token
. -
Refresh Endpoint:
POST /auth/refresh-token
-
Authentication: Requires a valid (anonymous or logged-in)
Bearer
token. -
Request Body:
{ "refresh_token": "YOUR_STORED_REFRESH_TOKEN" }
-
Response (Success):
-
Update Storage: Replace the old tokens with the new ones received from the refresh endpoint.
-
Refresh Token Failure: If the refresh token itself is invalid or expired, the user must log in again.
Token Refresh Flow Diagram:
Handling Expired Refresh Tokens (Long User Absence)
What happens if a user returns to your app after a long time, and both their access token and refresh token have expired? Attempting to use the refresh token will fail.
Best Practice:
- On App Load: Always attempt to validate the user’s session. A common way is to try refreshing the token immediately (
POST /auth/refresh-token
). If that fails, or if you have no tokens stored, proceed to the next step. - Re-authenticate Anonymously: Call
POST /auth/anonymous
again. - Preserve User ID: To ensure continuity for analytics and user history, include the expired access token (if you still have it) in the
Authorization: Bearer
header of thePOST /auth/anonymous
request.- Commerce Engine intelligently recognizes the expired token, finds the associated
user_id
, and issues new anonymous access and refresh tokens linked to that same existinguser_id
. - If no expired token is sent, a completely new anonymous user ID and tokens will be generated.
- Commerce Engine intelligently recognizes the expired token, finds the associated
Expired Token Recovery Flow:
-
This ensures that even after long absences, user activity remains tied to their original profile, providing valuable insights and enabling personalization upon eventual login.
User Management & Preferences
Once a user is logged in, you can manage their profile and preferences:
- Retrieve User:
GET /auth/user/{id}
- Get full user details. - Update User:
PUT /auth/user/{id}
- Update name, etc. - Notification Preferences:
GET /auth/user/{id}/notification-preferences
- Retrieve current settings.POST /auth/user/{id}/notification-preferences
- Create initial preferences (if not set).PUT /auth/user/{id}/notification-preferences
- Update preferences (allow users to opt-in/out of transactional, promotional, newsletter emails/SMS/WhatsApp). SeeNotificationPreferences
schema.
- Profile Image: Manage user profile images (Requires
multipart/form-data
):POST /auth/user/{id}/profile-image
- Add image.PUT /auth/user/{id}/profile-image
- Update image.DELETE /auth/user/{id}/profile-image
- Remove image.GET /auth/user/{id}/profile-image
- Retrieve image URL.
- Deactivate Account:
PUT /auth/user/{id}/deactivate
- Mark the user account as inactive.
Logout
To log a user out, you invalidate their current session tokens server-side and clear them client-side.
- Endpoint:
POST /auth/logout
- Authentication: Requires a valid logged-in user’s
Bearer
token. - Action: Commerce Engine invalidates the associated refresh token server-side.
- Response: The API returns a
200 OK
response containing:- The
user
object, now updated to reflect an anonymous state (is_anonymous: true
,is_logged_in: false
). - A new set of anonymous
access_token
andrefresh_token
, linked to the sameuser_id
.
- The
- Client-Side Action:
- Clear Old Tokens: Securely remove the previous (logged-in)
access_token
andrefresh_token
from storage. - Store New Anonymous Tokens: Store the new anonymous tokens received in the response.
- Update Local State: Crucially, update your application’s local user state (e.g., in your state management library) using the
user
object provided in the logout response. This ensures your UI correctly reflects the now-anonymous status while retaining the underlyinguser_id
.
- Clear Old Tokens: Securely remove the previous (logged-in)
State Management Best Practice
To simplify client-side state management and avoid conflicts, always update your local user state object based on the user
object returned by Commerce Engine API responses (like Login, Verify OTP, Refresh Token, Update User, and Logout). Treat the user
object from CE as the source of truth for the user’s current status and details.
Logout Flow Diagram (Updated):