This easy to use integration method allows a user to scan a QR code to sign into your application. If the user doesn’t have the Verida Wallet installed, they will be prompted to install it. Existing users will be prompted to authorize your application to access encrypted storage for that application.
Installation
This requires installing the @verida/account-web-vault
dependency:
npm install @verida/account-web-vault @verida/client-ts
Usage
Here’s how you initialize an application context:
import { Network as NetworkClient } from '@verida/client-ts';
import { Network } from '@verida/types';
import { VaultAccount } from '@verida/account-web-vault';
const VERIDA_NETWORK = Network.BANKSIA; // BANKSIA (testnet) or MYRTLE (mainnet)
const CONTEXT_NAME = 'My Application: Context Name';
// Logo for your application, should be a 170x170 PNG file
const LOGO_URL = "https://assets.verida.io/verida_login_request_logo_170x170.png";
const account = new VaultAccount({
request: {
logoUrl: LOGO_URL,
// openURL: An optional URL that will open a browser on the user's mobile device
// after accepting the login request in the Verida Wallet mobile app
openURL: window.location.href,
},
// network: Indicates to the Wallet which network the identity should be on.
network: VERIDA_NETWORK,
});
const context = await NetworkClient.connect({
client: {
network: VERIDA_NETWORK,
},
account: account,
context: {
name: CONTEXT_NAME,
},
});
if (!context) {
console.log(
'User cancelled login attempt by closing the QR code modal or an unexpected error occurred'
);
}
Configuration
Various configuration options can be set (as parameters in VaultAccount
) for the Verida Connect SDK.
These (all optional) config options include:
request?
— An object representing an authorization request that matches https://vault.schemas.verida.io/auth/loginRequest/latest/schema.jsonrequest?.logoUrl?
— The URL of a 170x170 PNG logo to display in the Walletrequest?.openUrl?
— An optional URL for the Wallet to open in the default browser on the user's mobile device after login is accepted. This will automatically authorize the user in local storage so future page loads of your application will be authenticated.request?.walletConnect?
— An optional configuration to automatically establish a wallet connection upon sign in. See WalletConnect Supportcallback?
— A callback function when the auth response is received.network?
- (banksia
,myrtle
) The Verida Wallet will ensure the user account exists on this network. Defaults tomyrtle
.deeplinkId?
— The HTML element ID of a link that should have the deeplink URI attached to thehref
propertyserverUri?
— An optional string representing the WSS URI of the authentication server. Leave this blank to use a server hosted by Verida or host your own (See Authentication server)loginUri?
— The login URI or page where the user will be sent to login using the app; ie: vault.verida.io.canvasId?
— A string representing the DOM id where the QR code canvas will be injected
When the user accepts the login request, an accessToken
and a refreshToken
are returned to the browser. If an accessToken
expires, the SDK will automatically attempt to fetch a new accessToken
using the refreshToken
. If the refreshToken
has expired, the SDK will re-open the QR code SSO modal and ask the user to re-login before continuing. Any existing network connections will be restored once the user logs in again.
Open URL
Due to limitations with how mobile devices work, the redirection of the user, enabled by the request?.openUrl?
option, will open a new tab in the default browser.
It is recommended to use the hasSession
method and a conditional connect()
to optimize the user experience. An example of this pattern is shown in the Single Sign On tutorial.
Authorization uses an accessToken
and a refreshToken
. If an accessToken
expires, the SDK will automatically attempt to fetch a new accessToken
using the refreshToken
. If the refreshToken
has expired, the SDK will re-open the QR code SSO modal and ask the user to re-login before continuing. Any existing network connections will be restored once the user logs in again.