FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. Popular
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics
    • All categories
    • R

      Unsolved Issue with Getting Started guide, invalid client

      Q&A
      • • • raymondcamden
      5
      0
      Votes
      5
      Posts
      830
      Views

      mark.robustelliM

      @raymondcamden Ha, gald you got it working. Generally, the quickstarts come with a docker file that you can just run docker compose against and it will get you the instance. That instance would be configured to work with the sample code for that quickstart. The application and uses would be created and things like that. If you have it working the way you want, awesome. If you run into other issues, please just let us know.

    • J

      Unsolved Redirect loop between login and consent page during OAuth2 authorization (Proof of Concept)

      Q&A
      • • • jefferson.piscos
      4
      0
      Votes
      4
      Posts
      41
      Views

      mark.robustelliM

      @jefferson-piscos, the debug enabled is under the OAuth tab. Go ahead and enable that and check the logs.

      Screenshot 2025-09-25 at 7.48.42 AM.png

      Also it is a little weird that you are redirected to a consent screen. Do you have any consents configured? You can go to Settings -> Consents in the Admin UI.

      Screenshot 2025-09-25 at 7.55.20 AM.png

      Then you can check the user and see if you have any set for the user you are testing.

      Screenshot 2025-09-25 at 7.55.29 AM.png

      Hopefully that will clear it up and you will be good to go. If not, let's see what those logs say.

    • E

      Is there away to provide error message data from a webhook via either Webhook or Event logs?

      General Discussion
      • • • edschlough
      3
      0
      Votes
      3
      Posts
      927
      Views

      D

      @mark-robustelli said in Is there away to provide error message data from a webhook via either Webhook or Event logs?:

      @edschlough If you take a look at the example code from the webhook documentation, it shows how to return errors. Is this what you are after?

      Thank you so much

    • E

      How to implement mutual TLS (mTLS) with FusionAuth — best practices and real-world solutions?

      General Discussion
      • • • ehallpassofficial
      3
      0
      Votes
      3
      Posts
      474
      Views

      V

      I see your point about using a proxy, but I’m not fully convinced it’s the best long-term solution.

      The problem with putting all the responsibility on the proxy is that it creates another layer of complexity and a single point of failure. If FusionAuth is going to support enterprise-level security use cases, shouldn’t mTLS be handled natively instead of relying on external workarounds?

      Upvoting the issue is fine, but depending on a proxy feels more like a patch than a real fix. Curious to hear if others think this approach is sustainable, or if we should be pushing harder for first-class support directly in FusionAuth.

    • D

      Unsolved Generic Connector, OAuth2.0

      Q&A
      • • • d.chinguun.0301
      3
      0
      Votes
      3
      Posts
      604
      Views

      D

      @mark-robustelli thank you. I forgot to mention that I am already consuming FusionAuth events using webhooks, but there is no application ID in the event body. but it is okay i will manage it anyway

    • M

      Issues with multi-tenant refresh token revocation and custom JWT signing

      General Discussion
      • • • michaelginn529
      2
      0
      Votes
      2
      Posts
      40
      Views

      mark.robustelliM

      @michaelginn529 What do you have your "Logout behavior" set to for the application? Any other specific configuration you can share would help as well.

    • H

      Unsolved Proxy IP Issue

      Q&A
      • • • haziqt
      4
      0
      Votes
      4
      Posts
      890
      Views

      mark.robustelliM

      @haziqt Sounds like FusionAuth is up and working except reporting the wrong IP address of the user on login. You may want to consider opening a issue.

    • W

      Solved Implementing Phone Number Verification in FusionAuth Without Enabling 2FA

      Frequently Asked Questions (FAQ)
      • mfa • • wesley
      4
      1
      Votes
      4
      Posts
      2.1k
      Views

      danD

      Just an FYI, as of 1.59.0, phone number verification is now fully supported in FusionAuth.

      Read more here: https://fusionauth.io/docs/lifecycle/manage-users/verification/gate-accounts-until-user-phone-verified

    • danD

      Solved How to deal with sign-up spam?

      Q&A
      • • • dan
      6
      0
      Votes
      6
      Posts
      2.2k
      Views

      danD

      @atakan @theogravity-sb Seems like two different issues here.

      @theogravity-sb is talking about attackers using the Google identity provider to create accounts with malicious names. @atakan is talking about attackers using self-service registration to create accounts with malicious names. They seem related but not identical. When you are allowing people to create their own identity and/or delegate to another source of identity, you decrease friction but give up some control.

      The bad news is that FusionAuth has nothing out of the box to stop this behavior.

      The good news is that you can build an integration to stop it. There are email verification services that give you a risk factor for email addresses and you can check that before you allow for registration or login.

      Here's a blog post I wrote about leveraging a third-party service to check the validity of emails provided during registration. This post uses a self-service registration validation lambda, but for the Google identity provider use case, you could use the login validation lambda and perform the same type of check.

      While I used Fideo because it had a good API and I had a connection there, I have not done an extensive survey of the landscape of email verification services, so cannot recommend any particular service.

    • W

      Solved How to Monitor FusionAuth Cloud with Datadog (via Prometheus) and Track 2FA Drop-Off

      Frequently Asked Questions (FAQ)
      • mfa • • wesley
      2
      0
      Votes
      2
      Posts
      332
      Views

      W

      You cannot integrate Datadog directly into the cloud-hosted version of FusionAuth. The only relevant section in the documentation is "Use Datadog Agent on a Remote Host." This requires setting up Datadog to monitor FusionAuth using the Prometheus Metrics API endpoint. For monitoring failed 2FA rates, FusionAuth does not currently have built-in support. There is no webhook for failed MFA, but you can use the failed login webhook to monitor incorrect password attempts.

      Retrieve system metrics using Prometheus
      Use the Datadog Agent on a remote host
      User login failed webhook

    • W

      Solved Configuring Proofpoint Cloud with FusionAuth SMTP

      Frequently Asked Questions (FAQ)
      • api • • wesley
      2
      0
      Votes
      2
      Posts
      217
      Views

      W

      FusionAuth uses standard SMTP for all email connections. As long as Proofpoint Cloud supports a standard SMTP connection where FusionAuth sends transactional emails, initiates a handshake, and completes delivery, the integration will work. You can reference our documentation for details on configuring SMTP with common providers:

      Configure Email

    • W

      Solved Using Separate Applications in a Single Tenant for AD/Entra ID and Client Authentication

      Frequently Asked Questions (FAQ)
      • idp • • wesley
      2
      0
      Votes
      2
      Posts
      384
      Views

      W

      You can manage both flows within a single tenant. Typically, you’d configure separate applications, one for the Admin portal tied to your AD/Entra ID provider, and another for your client-facing site using FusionAuth. You can then use login hints or managed domains to direct users to the correct Identity Provider (IdP).

      Identity Provider Hints
      Managed Domains

    • danD

      Solved Non-Existent or Intermittent Internet Access When Using FusionAuth

      Q&A
      • disconnected • • dan
      2
      0
      Votes
      2
      Posts
      864
      Views

      danD

      Yes.

      A few options. Let's assume you have a FusionAuth instance hosted in your cloud (the cloud instance) and that you'll be running an instance on the cruise ship (the cruise ship instance). The cloud instance contains all user data. The cruise ship instance is going to be set up fresh for each cruise, with a copy of data from the cloud instance. It'll contain just the users on the cruise ship, and applications on the cruise ship will be set up to authenticate against it.

      Overview Table Option Use When Notes Works With FusionAuth Cloud Use The Cloud Instance You have connectivity. Included for completeness. Yes Cruise Ship FusionAuth With QR Codes You only want to let the user modify their profile, are okay with the risk of the QR code being stolen and the user being impersonated. Need to use the API/SDKs to fully implement. Yes Cruise Ship FusionAuth With Existing Passwords You want the cruise ship instance to be the source of truth for users on the ship. No Cruise Ship FusionAuth With Existing Passwords And Changes Allowed to Cloud FusionAuth If accounts of cruise ship users need to be modifiable by people on the cruise ship and on land. Requires careful profile and credential merge logic. No Use The Cloud Instance

      Use the cloud FusionAuth instance for all requests. This is the simplest solution, though it may be costly or lead to degraded functionality.

      This is mentioned for completeness, but doesn't really address the core issue of missing or intermittent internet connectivity.

      Cruise Ship FusionAuth With QR Codes

      Here you are migrating the source of truth for these users to the cruise ship instance, excluding passwords, and then syncing the profile data back.

      The main reason to choose this option is because it works with a FusionAuth Cloud hosted cloud instance, where you do not have access to the password hashes.

      Steps: Copy user profile data to the cruise ship instance using the User API. Create a QR code that is associated with each user and add it to the ticket (or provide it separately). The user can then log in by scanning their phone. The QR code should include the user's login Id. Implement using the passwordless API, starting the passwordless login with the users id, and completing the login by catching the code and using the complete login API call. Mark the accounts as 'on-cruise' in the user.data field. By doing this, you can clearly differentiate between the users on the cruise and anyone else in your CIAM system. This makes it easier to merge their profile data after the cruise. Set up a webhook to disable any updates to these user accounts in the cloud FusionAuth instance while on the cruise. You can do this by setting up a transactional webhook on user.update that fails when the user being updated has the 'on-cruise' attribute set. When on the ship, users can log in with these credentials and access applications, as well as update their profiles. After the cruise is done, compare the profile update timestamps for all users in the cruise instance with the same account on the cloud instance. If the update timestamps do not match, update the cloud instance with the new profile data. Do not move the password hashes. Remove the 'on-cruise' attribute from users in the cloud instance.

      Security Warning: This is a security risk! Understand the security model of an account takeover in the cruise ship instance. If anyone else scans the QR code, they can get access to the user's account.

      The benefit is simple merging of data. You also don't need access to the database of the cloud instance, because all the data you are merging is available via the API.

      After successfully pushing the data to the cloud server, wipe the cruise ship FusionAuth instance.

      Cruise Ship FusionAuth With Existing Passwords

      Here you are migrating the source of truth for these users to the cruise ship instance, including passwords, and then syncing them back.

      Steps: Build an import script by reading the password hashes and other password data from the cloud instance for the users who are going on the cruise. This requires direct database access to the cloud instance. Import the users using the Import API to the cruise ship instance. Mark the accounts as 'on-cruise' in the user.data field. By doing this, you can clearly differentiate between the users on the cruise and anyone else in your CIAM system. This makes it easier to merge their profile and credential data after the cruise. Set up a webhook to disable any updates to these user accounts in the cloud FusionAuth instance while on the cruise. Do this by setting up a transactional webhook on user.update that fails when the user being updated has the 'on-cruise' attribute set. When on the ship, users can log in with their normal credentials and access applications, as well as update their profiles and password. After the cruise is done, compare the update timestamps for all users in the cruise instance with the same account on the cloud instance. If the update timestamps do not match, build an import file with the profile data and updated credentials. Read the credentials from the cruise ship instance database. Remove the 'on-cruise' attribute from users in the cloud instance. Delete the users' accounts in the cloud instance and import the user data from the cruise ship generated file.

      The benefit is simple merging back to the cloud instance, because only one instance accepts changes at a time. A user is either managed by the cloud instance or by the cruise ship instance.

      Automated account recovery won't work, so plan to allow staff to reset passwords if needed.

      After successfully pushing the data to the cloud server, wipe the cruise ship FusionAuth instance.

      Cruise Ship FusionAuth With Existing Passwords And Changes Allowed to Cloud FusionAuth

      Here you are migrating these users to the cruise ship instance, including passwords, and then merging them back.

      Steps: Build an import script by reading the password hashes and other password data from the cloud instance for the users who are going on the cruise. This requires direct database access to the cloud instance. Import the users using the Import API to the cruise ship instance. Mark the accounts as 'on-cruise' in the user.data field so that we'll know which users to merge. When on the ship, users can log in with their normal credentials and access applications, as well as update their profiles and password. The same accounts can be updated in the cloud instance by users or automated processes on land. After the cruise is done, compare the update timestamps for all users in the cruise instance with the same account on the cloud instance. If the update timestamps do not match, build an import file with the profile data and updated credentials. For the latter, you'll need to read from the cruise ship database. Prepare to merge the data from the cruise ship and cloud instances. Read all accounts with the 'on-cruise' from the cloud instance with an update date later than the start of the cruise. Find all the users on the cruise ships with an update date later than the start of the cruise. For each account, see what changes were made: If a cloud instance did not change and the cruise ship instance did not change, remove the 'on-cruise' data marker and do nothing else. If a cloud instance changed and the cruise ship instance did not, remove the 'on-cruise' data marker and do nothing else. If a cruise ship instance changed and the cloud instance did not, prepare an import entry from the cruise ship instance for this user. Delete the cloud instance account and then import the cruise ship instance account. If a cruise ship instance changed and the cloud instance did as well, prepare an import entry from the merged cruise ship and cloud instances. How you do this is business dependent. There may be user profile data that should be merged, and other data that might belong to either the cruise ship instance or cloud instance. The most recent password, wherever it lives, is the one that you should use for the import. When the merge is complete, write an import entry to a file. Remove the 'on-cruise' attribute at the same time. When all accounts have been merged successfully, delete the cloud instance account and then import the merged account.

      Automated account recovery won't work, so plan to allow staff to reset passwords if needed.

      After successfully pushing the data to the cloud server, wipe the cruise ship FusionAuth instance.

      Other Considerations

      If you are only allowing the user to change their profile data, you can move data without accessing the database. If users can change their passwords, you have to have access to the database to re-import them. (Or you can force a password reset.) The same applies to other secrets such as passkeys or TOTP secrets.

      Options 1 and 2 work with FusionAuth Cloud hosted servers, but the other options do not because you don't have access to the database with FusionAuth Cloud.

      If you allow a user to register on the cruise ship server, you will have to check for merge conflicts. If someone registered on the cruise ship, it is possible someone could have done the same on the cloud instance during the time of the cruise. Since you know all the cruise ship users, you can alternatively create accounts for everyone and disallow on ship registration.

      When reading the password hashes, make sure you consult the schema for your version of FusionAuth, because the location of password hashes may change over time.

      Account recovery is not available on the cruise ship, so make sure staff understands how to reset a user's password directly via the admin UI.

      What is outlined above takes the final state of the user from the cruise ship and propagates it back the cloud instance. If you need to keep track of changes to the user on the cruise ship instance and replay them in order, use the webhook and event log to capture the events locally. Then replay them when the cruise ship docks using kafka.

    • W

      Solved Creating Users Without SMTP: How to Manually Set Passwords in FusionAuth

      Frequently Asked Questions (FAQ)
      • api • • wesley
      2
      0
      Votes
      2
      Posts
      505
      Views

      W

      Yes, you can create a user without SMTP configured. In the Admin UI, disable the Send Setup Password option and set the password manually during user creation. If you’re using the API, set "sendSetPasswordEmail": false and include a "password" field in the user object.

      Users API

    • W

      Solved Safe Upgrade Guide: Moving from FusionAuth 1.54 to 1.59

      Frequently Asked Questions (FAQ)
      • upgrade • • wesley
      2
      0
      Votes
      2
      Posts
      560
      Views

      W

      During an upgrade, FusionAuth monitors your deployment, and if it becomes unresponsive for more than five minutes, the on-call engineer is alerted. A snapshot of the database is taken before the upgrade, so a rollback is possible, though it is manual and would result in data loss from the time of the upgrade to the rollback. Rollbacks are very rare and have only happened once in the past four years.

      You can safely upgrade directly to 1.59, and many customers do skip versions. The upgrade process is straightforward: once started, the deployment status changes to Upgrading and returns to Active when complete. For production instances, downtime is minimal (typically seconds, if at all) because multi-node deployments use rolling upgrades. Most upgrades take under 20 minutes, though in rare cases they can take up to an hour.

      FusionAuth never forces you to upgrade, but if you are running a very old version (1–2 years behind) and encounter issues, support may request that you upgrade before troubleshooting.

      Upgrading a Deployment

    • danD

      Solved Can I do a step up authentication with WebAuthn/passkeys?

      Q&A
      • webauthn passkeys step-up • • dan
      2
      0
      Votes
      2
      Posts
      665
      Views

      danD

      We have an open issue to make passkeys one of the supported MFA methods.

      But you can perform a step up passkey challenge using the APIs or the SDKs by doing the following:

      User tries to access a restricted resource Customer app sees if the user has already been granted access (via the presence of a cookie, or some other mechanism). If they have, let them through. If the user hasn’t been granted access, perform a webauthn assertion workflow Call the /api/webauthn/start to get the workflow started Interact with the authenticator to produce the signature and whatever other information is needed. This is authenticator-specific. Call the /api/webauthn/assert to complete the workflow and prove possession of the authenticator If the workflow is successful Write a cookie or whatever if you want to remember this permission Let the user through If the workflow isn’t successful Deny access

      If someone doesn't have a passkey enabled, which you can check by calling the /api/webauthn?userId={userId} API, direct them to the self-service account management passkey management pages.

      Here are the API docs for the webauthn API.

    • S

      Changes not being applied

      General Discussion
      • • • sspinn
      6
      0
      Votes
      6
      Posts
      3.4k
      Views

      mark.robustelliM

      @benlabbe2007 What version of FusionAuth are you running?

    • A

      OAuth Complete Registration functionality breaks the authorization flow after upgrading to version 1.59.1

      Comments & Feedback
      • • • atabakov
      3
      0
      Votes
      3
      Posts
      606
      Views

      danD

      FYI, this was fixed in 1.60.0, per the release notes.

      In version 1.59.0 the password is now optional when creating or updating a user.

      When returning from a third-party login, a user may be prompted to complete registration by entering a password when self-service is enabled and is configured to require a password.

      This was unintended and has been corrected.

      https://fusionauth.io/docs/release-notes/

      Tracking issue: https://github.com/FusionAuth/fusionauth-issues/issues/3159