Better Auth
Better Auth is a framework-agnostic, comprehensive authentication and authorization framework for TypeScript with a plugin ecosystem covering 2FA, passkeys, multi-tenancy, SSO, and more.
Documentation
Key Capabilities
Better Auth ships built-in support for features that typically require external libraries:
- Two-factor authentication — TOTP/OTP via the
twoFactorplugin, no third-party lib needed - Passkeys — WebAuthn support via the
passkeyplugin - Multi-session — concurrent sessions per user via the
multiSessionplugin - Organization/multi-tenancy — teams, roles, and permissions via the
organizationplugin - Admin panel — user management API via the
adminplugin - OIDC/OAuth provider — make your app an identity provider via
oidcProvider - API key management — issue and validate API keys via the
apiKeyplugin
Best Practices
Plugins require both server and client registration.
Adding a plugin only to the server-side auth config is not enough. Every plugin that exposes client-callable endpoints must also be added to createAuthClient({ plugins: [...] }). Without the client plugin, the typed methods are absent and requests will fail.
// server: auth.ts
export const auth = betterAuth({
plugins: [twoFactor()],
})
// client: auth-client.ts — must mirror server plugins
export const authClient = createAuthClient({
plugins: [twoFactorClient()],
})
Cookie cache delays session revocation.
When cookieCache is enabled, calling revokeSession or signing out on one device does not immediately invalidate other devices' sessions. The old session remains valid until the cookie cache maxAge expires. Design logout flows accordingly — do not rely on instant cross-device revocation when cookie caching is active.
Session freshness and session validity are independent checks.
A session can be valid (not expired) but not "fresh" (too old since creation). Certain sensitive endpoints enforce freshness via freshAge. Treat a 401 on a protected endpoint as potentially a freshness failure, not just an expiry — prompt re-authentication rather than a full sign-out flow.
disableOriginCheck disables CSRF protection too.
The option name implies only URL validation is affected, but it simultaneously disables the origin-header-based CSRF defense. Never set disableOriginCheck: true in production. Use trustedOrigins to allowlist specific domains instead.
Custom session fields are never served from cache.
Fields added via session customization functions are re-fetched from the database on every request, even when secondary storage or cookie caching is configured. Heavy custom session computations have no cache benefit — keep them lightweight or memoize externally.