FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. Popular
    Log in to post
    • All Time
    • Day
    • Week
    • Month
    • All Topics
    • New Topics
    • Watched Topics
    • Unreplied Topics
    • All categories
    • S

      Doubling of login records

      General Discussion
      • • • sergey_smirnov
      15
      0
      Votes
      15
      Posts
      4.4k
      Views

      mark.robustelliM

      @sergey_smirnov OK. It doesn't seem like the webhook you are using would cause the duplicate logins. I came across this post stating that exchanging a refresh token counts as a login event. I'm wondering if something like the user logins in using a new tab, then goes back to the old tab that triggers a refresh. If that is the case, that could account for the delay between logins and the "Something doesn't seem right" message as that session is no longer valid because of the new login. You might be able to verify this by using a webhook. There is a JWT.Refresh event that you might be able to log somewhere to see if it fires around the time of the duplicate log ins.

    • J

      Unsolved SAML CSRF token issue

      Q&A
      • • • joseantonio
      5
      0
      Votes
      5
      Posts
      5.0k
      Views

      J

      @mark-robustelli
      Thanks I just did that.
      https://github.com/FusionAuth/fusionauth-issues/issues/3113

    • E

      Unsolved Unable to Obtain Tenant-Signed Access Token for Data-Plane Apps in a Multi-Client, Multi-Application FusionAuth Architecture

      Q&A
      • • • ezequiel.rebasa
      4
      0
      Votes
      4
      Posts
      49
      Views

      mark.robustelliM

      @ezequiel-rebasa said in Unable to Obtain Tenant-Signed Access Token for Data-Plane Apps in a Multi-Client, Multi-Application FusionAuth Architecture:

      prompt=none

      OK a few things. One is it looks like there are a few open issues #521 and #2208 around FusionAuth not supporting the "prompt=none" parameter.

      I may be missing something here, but using lambdas, I as able to hit the login event for both Tenants when logging in. I image you could make the changes you needed there.

      I set up FusionAuth so that I have 2 Tenants Default and Test Tenant.

      In Default there is the FA Login Master application.

      I the Test Tenant I have the ExampleDotNetApp application.

      I set up an Identify Provider named FusionAuth Default Tenant FA Login Master using the FA Login Master application as the (IdP) and enabled it on the Test Tenant ExampleDotNetApp. I created a lambda named "FA Default OpenID Reconcile" of type OpenId Connect reconcile.

      The order the Lamda's were executed were as follows:

      "FA Default Access Token Populate" of type JWT populate on FA Login Master

      "FA Default OpenID Reconcile" on FusionAuth Default Tenant FA Login Master

      "ExampleDotNetApp Access Token Populate" of type JWT populate on ExampleDotNetApp.

      You could use potentially use any of those to inject info you need on the JWT.
      **Please not that Lambda HTTP Connect is only available in an Essentials or Enterprise plan.

      When I add a favoriteColor in the "ExampleDotNetApp Access Token Populate" lambda, I am able to see it in the ExampleDotNetApp application after logging in.

      I would think with the access to those lambdas, you may be able to accomplish what you are trying to do.

    • P

      Unsolved Email verification fails in new incognito mode

      Q&A
      • • • pocfused
      4
      0
      Votes
      4
      Posts
      385
      Views

      mark.robustelliM

      @pocfused said in Email verification fails in new incognito mode:

      https://fusionauth.io/community/forum/topic/1406/link-in-email-verification-not-working-first-time

      Glad you were able to solve your issue.

      As far as the automatically verify the email part. What settings do you have for Applications -> Your Application -> Registration -> Verification strategy? There is a setting Clickable link. Is that what you are after?

      Another thought would simply turning off Verify registrations in the Applications -> Your Application -> Registation tab work for you or do you still want the user to actually have to click on a link? (It would make sense to ensure the user owns the email address.)

      You could also do something like provide a custom template and direct them to your application and then automatically verify them using the APIs. Check out this blog post.

      Good luck.

    • D

      Customizing FusionAuth User Invitation Flow

      General Discussion
      • • • davidhaven1246
      3
      0
      Votes
      3
      Posts
      119
      Views

      D

      @mark-robustelli thanks

    • E

      Unsolved Logout with multiple subdomains

      Q&A
      • logout domains • • ext_figuvini
      6
      0
      Votes
      6
      Posts
      985
      Views

      B

      @mark-robustelli said in Logout with multiple subdomains:

      @ext_figuvini after reading your post again, I think I read it differently. The way the SSO logout works is that on logout, FusionAuth calls all the logout urls for each applications. It would seem that you are correct in that creating an application for each subdomain makes sense and would work. (You can create applications through the API so you should be able to automate this.) Can you try this for a few domains and confirm it works?

      Your point is correct. Creating a separate application for each subdomain is a reasonable and correct solution.
      When a user logs out of the SSO system, FusionAuth will call the logout URLs defined in each configured application in turn. This allows each application to clean up its own session. Pretty good solution

    • N

      Unsolved Send email to set up password - This feature is currently not enabled, see the tenant email configuration

      Q&A
      • • • nate
      2
      0
      Votes
      2
      Posts
      10
      Views

      mark.robustelliM

      @nate Can you successfully Send test email from Tenants -> Select Edit from desired Tenant -> Email in the AdminUI? This will test if your SMTP settings are correct.

    • danD

      Solved Can I offer "login with yahoo" using FusionAuth?

      Q&A
      • yahoo login federation social logins • • dan
      2
      0
      Votes
      2
      Posts
      37
      Views

      danD

      Yes. You can use FusionAuth's OpenID Connect Identity Provider.

      I did this a few weeks ago, so am writing these instructions from memory.

      Prerequisites:

      A yahoo account A running FusionAuth instance (localhost is fine)

      Steps:

      Go to the Yahoo! developer network and create an app. The redirect URI for Yahoo is https://<your instance>/oauth2/callback Save off the provided Client ID (Consumer Key) and Client Secret (Consumer Secret). Then go to FusionAuth and create an OpenID Connect Identity Provider: <your instance>/admin/identity-provider/add/OpenIDConnect Put the Client ID (Consumer Key) and Client Secret (Consumer Secret) into the Client Id and Client secret fields, respectively. Uncheck Discover Endpoints. Manually configure the endpoints: Set the Authorization Endpoint to https://api.login.yahoo.com/oauth2/request_auth Set the Token Endpoint to https://api.login.yahoo.com/oauth2/get_token Set the Userinfo Endpoint to https://api.login.yahoo.com/openid/v1/userinfo Set the Scope to openid email profile and any other scopes you might need. (I was unable to find an authoritative list, but here's info about the mail scopes.) Update the Button text and Button image as needed. Enable it for applications as needed. Save the Identity Provider.
    • mark.robustelliM

      Solved Why is the kickstart not running when I spin up the docker container?

      Frequently Asked Questions (FAQ)
      • • • mark.robustelli
      2
      0
      Votes
      2
      Posts
      506
      Views

      mark.robustelliM

      First check out the information you are getting from the docker log. Look at the log from the spin up and search for "kickstart." Was the container able to find the kickstart.json file? (In this case yes.)

      If the kickstart file was found, continue searching through the log for a potential error in the running of the kickstart. You might see something like.

      fusionauth-1 | 2025-07-02 05:14:05.177 PM ERROR io.fusionauth.api.service.system.kickstart.KickstartRunner - Failed to execute request to [PATCH][/api/user/registration/000000000001] Status [404] fusionauth-1 | Request body: fusionauth-1 | { fusionauth-1 | "registration" : { fusionauth-1 | "applicationId" : "e72dca1d-626c-4f4b-8f36-b7c8c2c0af33" fusionauth-1 | } fusionauth-1 | } fusionauth-1 | 2025-07-02 05:14:05.177 PM ERROR io.fusionauth.api.service.system.kickstart.KickstartRunner - Error response: fusionauth-1 | null

      This will let you know there was an error and you need to resolve it. In this specific case, The PATCH request should have been a POST. Once that was changed, the kickstart ran fine.

    • J

      Unsolved Populate the First Name and Last Name when logging in with Google.

      Q&A
      • • • jakub.hajto
      2
      0
      Votes
      2
      Posts
      508
      Views

      mark.robustelliM

      @jakub-hajto , you may want to check out the Google Reconcile Lambda documentation. I also found this post that may be useful for you.

    • W

      Solved Best Practices for Securing Partner APIs with FusionAuth

      Frequently Asked Questions (FAQ)
      • login authentication • • wesley
      2
      0
      Votes
      2
      Posts
      488
      Views

      W

      Yes—using FusionAuth access tokens to secure partner-facing APIs is a solid approach. The key is ensuring the tokens contain the right claims to enforce proper authorization for your endpoints.

      Separating partners into a different tenant or application can improve security and simplify management. Different tenants fully isolate users and tokens, but would require duplicating application configs. Alternatively, you could keep partners in the same tenant and distinguish them via roles, claims, or separate applications.

      If partners are accessing APIs server-to-server, the client credentials grant (Entities in FusionAuth) is the correct choice. Be sure to carefully scope each partner’s access to avoid over-permissioning.

      More on these topics:

      API Authorization with FusionAuth Tenants Overview JWT Anatomy Authorization Models
    • W

      Solved How to Safely Add a New Custom Domain in FusionAuth

      Frequently Asked Questions (FAQ)
      • cloud domains • • wesley
      2
      0
      Votes
      2
      Posts
      181
      Views

      W

      Yes—you can safely add a fourth custom URL. The “replace” label appears because the system expects you to submit the entire list of domains each time. To avoid losing any URLs, make sure all four domains—including your existing three—are entered in the form before you submit. Only custom domains omitted from the list will be removed.

      More details here:
      Updating Custom Domains

    • W

      Solved How to Report on Users with MFA Enabled in FusionAuth

      Frequently Asked Questions (FAQ)
      • search • • wesley
      2
      0
      Votes
      2
      Posts
      488
      Views

      W

      Yes! FusionAuth stores MFA details on the user object, and you can search for users with MFA enabled using Elasticsearch queries.

      For example, in the Admin UI’s User search, you can run:

      _exists_:twoFactor

      This returns all users with at least one MFA method configured. You can also perform similar searches via the User Search API to build custom reports. For more details on searchable user fields and Elasticsearch queries, see:

      User Fields Reference User Search with Elasticsearch
    • W

      Solved How to Support Elevated OAuth Scopes for Select Users in FusionAuth with Google Reauthentication

      Frequently Asked Questions (FAQ)
      • idp • • wesley
      2
      0
      Votes
      2
      Posts
      155
      Views

      W

      This is definitely an uncommon scenario, so there’s no out-of-the-box flow documented for it, but here’s one way to handle it:

      Create a second Google IdP: FusionAuth supports only one native Google IdP, but you can set up an additional Google connection as a generic OpenID Connect (OIDC) IdP. This second IdP can request the elevated scopes you need for email access. See the OIDC docs here: OpenID Connect IdP in FusionAuth. Trigger reauthentication: When a user opts into the email client feature, redirect them through the second IdP’s OAuth flow to acquire the elevated scopes. This effectively escalates their session without forcing all users through additional authentication unnecessarily.

      This approach allows you to avoid reauthentication for users who don’t need the extra scopes while supporting a higher-privilege flow for users who do.

    • W

      Solved Why FusionAuth Webhooks Show ONE_TIME_PASSWORD Authentication Type for Logins

      Frequently Asked Questions (FAQ)
      • webhooks webhook lambda • • wesley
      2
      0
      Votes
      2
      Posts
      152
      Views

      W

      Great question—this often causes confusion.

      In FusionAuth, logging in after a Forgot Password flow is tracked as ONE_TIME_PASSWORD. That’s because, technically, FusionAuth uses a one-time password during that process. For example, if you look at the Change a User’s Password API, it returns a one-time password token. On the hosted pages, FusionAuth automatically consumes this token to sign the user in immediately after they reset their password via the forgot password link in their email.

      So even without traditional OTP or MFA configured, these login events can appear as ONE_TIME_PASSWORD due to password reset flows.

    • W

      Solved Maintaining OAuth/PKCE Flow During Email Verification in FusionAuth Mobile Apps

      Frequently Asked Questions (FAQ)
      • login authentication • • wesley
      2
      0
      Votes
      2
      Posts
      495
      Views

      W

      Good question—it’s a common challenge.

      By default, the email verification flow breaks the OAuth/PKCE context because the user leaves the registration page to check their email and clicks a verification link. FusionAuth can’t continue the OAuth flow automatically from that email link, which is why your hard-coded redirect URI fails without the required OAuth code.

      A better solution is to switch your email verification strategy from Clickable Link to Form Field (under Tenant → Email → Email Verification → Verification Strategy). With this approach, users stay on the original registration page, enter the verification code from their email, and the OAuth/PKCE flow remains intact—including the authorization code. This enables seamless redirecting back into your app after verification.

      If you’re creating and registering users for an application at the same time, remember to also check the app-level registration verification settings under:
      FusionAuth Admin UI → Applications → Edit Application → Registration tab.

      More details are in the docs: Registration Email Verification

    • W

      Solved Why Can Only One user_support_manager Remove MFA Devices in FusionAuth?

      Frequently Asked Questions (FAQ)
      • mfa • • wesley
      2
      0
      Votes
      2
      Posts
      145
      Views

      W

      You’re correct that user_support_manager is the right role, but it has a limitation: it can only remove MFA devices if the manager has the user’s MFA code or recovery codes. Only admins can disable MFA without those.

      If you want to remove MFA without needing a code, you’d need to use the User API to clear the user’s MFA data. Also, confirm that both support managers have the same role assigned under their registrations in the FusionAuth application. Check this under each user’s Source tab in the Admin UI under registrations.roles.

      More details:

      Update a User via API

      FusionAuth Admin UI Roles

    • W

      Solved Localizing Social Login Button Text in FusionAuth Themes

      Frequently Asked Questions (FAQ)
      • theme • • wesley
      3
      0
      Votes
      3
      Posts
      176
      Views

      W

      Yes, you can localize social login buttons, but it requires customizing your theme.

      In the Theme Helpers file, locate the macro for each IdP button—for example, the Google button macro (starting around line 409). Change the text like this:

      From:

      <div class="text">${identityProvider.lookupButtonText(clientId)?trim}</div>

      To:

      <div class="text">${theme.message('google-login')}</div>

      Then, define google-login in your Theme → Messages bundles for each supported language. Repeat the same process for the Apple button macro (starting around line 363).

      This allows the social login button text to display localized strings based on the user’s selected language.

    • W

      Solved Resolving MissingVerifierException When Configuring External JWT IdP in FusionAuth

      Frequently Asked Questions (FAQ)
      • • • wesley
      2
      0
      Votes
      2
      Posts
      506
      Views

      W

      This error usually means FusionAuth doesn’t have the public key it needs to verify the JWT signature.

      Make sure you’ve imported the public key that Keycloak uses to sign tokens into Settings → Key Master in FusionAuth. Check whether your JWT includes a kid (Key ID) claim. If it does, the key you import into Key Master must have a matching Key ID. You can confirm the Key ID after importing by clicking the view (🔍) icon next to the key.

      Once the correct key is imported and matches the kid from the JWT, FusionAuth will be able to verify the token’s signature.

    • W

      Solved Handling Default IdP Routing in FusionAuth Without idp_hint

      Frequently Asked Questions (FAQ)
      • idp • • wesley
      2
      0
      Votes
      2
      Posts
      491
      Views

      W

      FusionAuth doesn’t currently support setting a default IdP for an application or automatically forcing logins through an IdP. You’re welcome to submit a feature request on our GitHub issues page.

      If all your users share the same email domain, you could try Managed Domains to route them to the correct IdP.

      Another option is to place a proxy in front of FusionAuth. The proxy could inspect incoming requests and append the idp_hint before forwarding traffic to FusionAuth. You can learn more about using a proxy setup here.