FusionAuth
    • Home
    • Categories
    • Recent
    • Popular
    • Pricing
    • Contact us
    • Docs
    • Login
    1. Home
    2. dan
    3. Posts
    • Profile
    • Following 0
    • Followers 9
    • Topics 678
    • Posts 2,718
    • Best 193
    • Controversial 0
    • Groups 4

    Posts made by dan

    • RE: What are account recovery options with FusionAuth?

      Lots of options!

      • Self-service password recovery — SMS or Email based forgot password flows out of the box, with hosted pages that require no custom UI. If a user's login ID is a phone number, the reset is delivered via SMS automatically.
      • API-driven recovery — The full forgot password flow is triggerable via POST /api/user/forgot-password with an email, phone, or username as the login ID, giving teams complete control over the UI and recovery experience.
      • Admin and support-assisted recovery — Support staff can trigger resets or force password changes directly from the admin UI, no email required.
      • Admins can also remove MFA methods directly from the user record.
      • MFA recovery — Recovery codes generated at MFA enrollment let users bypass a lost second factor.
      • Self-service MFA configuration — Users can add, remove, and manage their own MFA methods (TOTP, SMS, email) from a hosted self-service account page without any admin involvement. Removing a method requires completing an MFA challenge first, which prevents unauthorized removal. If an admin removes a user's MFA method and the tenant or application policy is set to Required, the user will be prompted to set up MFA again on next login.
      • Webhooks and event-driven recovery — FusionAuth fires events like user.login.failed and user.password.reset that your backend can listen to and act on, enabling custom recovery logic, audit trails, and downstream notifications.
      • Account linking and IdP recovery — For users who log in via a social or enterprise IdP, FusionAuth can be configured to link that identity to a FusionAuth user record. If the IdP connection is the issue, the user can still go through the standard forgot password flow as long as an phone number or email is on their account, so recovery isn't solely dependent on the IdP being available.
      posted in Q&A
      danD
      dan
    • What are account recovery options with FusionAuth?

      What are account recovery options available with FusionAuth?

      posted in Q&A account recovery options
      danD
      dan
    • RE: how can I get an exact number of users with some attributes?

      You want to use search parameters like those outlined in this sample script.

      • use a key limited to POST on /api/user/search
      • set accurateTotal on the request
      • set numberOfResults to 1 on the request

      In the response, look at the total field.

      This will let you get exact numbers while reducing load on your instance.

      posted in Q&A
      danD
      dan
    • how can I get an exact number of users with some attributes?

      How can I get an exact number of users with some attributes? I'm using elasticsearch.

      posted in Q&A search
      danD
      dan
    • RE: Collect additional attributes at login after a user has been created and registered

      Beginning in version 1.65.0, FusionAuth offers Complete Registration. Full docs here.

      How this would work:

      • enable a registration form for the application your users are logging into
      • select certain attributes as required. If you are using a basic form, you could select 'birth date'. If you are using an advanced form, you can select whatever profile attributes you need
      • set the Registration mode to Complete registration. This setting means that users cannot self-register, but can complete missing information from an existing registration.
      • save the application

      Now, your admin user can create a user with a minimal amount of data (perhaps just an email address).

      The user will, at first login, be prompted to fill out their profile data, including all fields you've marked required.

      This is not full progressive registration, but can be useful in certain circumstances.

      posted in Q&A
      danD
      dan
    • Collect additional attributes at login after a user has been created and registered

      How can I collect additional profile attributes at login after a user has been created and registered?

      I'm using the hosted login pages. My admin user creates an account, but I want to collect other profile attributes from the user afterwards.

      posted in Q&A login profile attributes
      danD
      dan
    • RE: Adding custom url/domain - downtime?

      @kevin-doran This is a great question to ask FusionAuth support.

      Have you opened a ticket?

      posted in Q&A
      danD
      dan
    • RE: Applications data is not displayed in the admin UI details view in versions later than 1.60.2

      Thank you for letting us know.

      This is an open issue. To see when this is resolved, you can follow along with the github issue here: https://github.com/FusionAuth/fusionauth-issues/issues/3439

      posted in General Discussion
      danD
      dan
    • RE: offline access/authentication

      The cleanest way to do it is with asymmetric JWT verification plus a bounded offline grace period.** Here's the pattern.

      FusionAuth signs JWTs with a private key it holds. The matching public key is published at the JWKS endpoint (/.well-known/jwks.json). Your mobile app — or any resource server — can verify a token's signature locally, with zero network calls, as long as it has that public key. You can even bundle the public key with the application and avoid the retrieving it.

      That's the property that makes offline auth possible. You're not asking "is this token still good?" over the wire; you're asking "did FusionAuth sign this, and has it expired?" using math the device can do on its own.

      See JWT signing configuration and the JWKS endpoint docs.

      The Flow

      1. First login (online, required). The user authenticates against FusionAuth via OAuth with the offline_access scope, or via the Login API with loginId + password + applicationId. You get back two things:

      • A short-lived access token (signed JWT, RS256, EdDSA, or ES256)
      • A long-lived refresh token (opaque, default 30 days, configurable per tenant or application)

      Refresh token details are in the refresh token settings docs.

      2. Cache the JWKS on the device. Fetch /.well-known/jwks.json once and store it. You'll match incoming tokens to the right key using the kid in the JWT header. For fully air-gapped scenarios, you can bundle the JWKS into the app at build time — see the air-gapping article.

      3. Online operation. The app uses the access token for API calls. When it expires, the app calls the Refresh a JWT API with the refresh token to mint a new access token.

      4. Offline operation. The app validates the cached access token locally:

      • Find the key in the JWKS where kid matches the JWT header
      • Verify the signature with that public key
      • Check exp, iss, aud, and any custom claims you care about

      If the token is past exp but the device is offline, allow a bounded grace period (e.g., 24 hours past expiration). After that, degrade functionality until the device reconnects and refreshes. For instance, you could allow read operations but nothing that changes data.

      5. On reconnect. Refresh immediately. If the refresh token has been revoked server-side, the call will fail and the user must re-authenticate.

      Token lifetime tuning

      This is where you make your security/availability tradeoff explicit. FusionAuth lets you tune both lifetimes per tenant or per application:

      • Access token TTL (ttl_seconds😞 set this short for online use (5–15 minutes is typical), but if you want longer offline windows without the grace-period workaround, you can extend it. Whatever you pick is the maximum revocation lag for compromised tokens.
      • Refresh token duration: default is ~30 days. Use a Sliding Window with Maximum Lifetime policy if you want active devices to keep working but inactive ones to expire automatically.
      • One-Time Use refresh tokens: rotates the token value on every refresh. Strongly recommended — if a refresh token is stolen and used, the legitimate device's next refresh will fail and the theft is detected.

      What FusionAuth gives you for revocation

      Refresh tokens can be revoked automatically on password change, MFA enrollment, or any action that prevents login. You can also call the Revoke Refresh Tokens API directly. The catch: revocation only takes effect the next time the device tries to refresh. Already-issued access tokens remain valid until their exp.

      Tradeoffs you're signing up for

      Be honest with yourself about this approach. These aren't FusionAuth limitations, they're inherent to offline auth:

      • Delayed revocation. A stolen device retains access until the access token expires and the offline grace period elapses. Shorter access token TTLs mean faster revocation but more refresh traffic and shorter offline windows. Pick where on that curve you want to sit.
      • Clock trust. Offline exp checks rely on the device clock, which the user controls. If that matters for your threat model, store a "last known server time" on each refresh and refuse to validate tokens if the clock has moved backward.
      • Stale claims. If a user's roles or permissions change, the old claims persist in the cached token until the next refresh. Acceptable for most apps, not for high-stakes authorization.
      • Local credential storage. If you want users to "log in" while offline (PIN/biometric to unlock the cached session), you're storing something derivable from their credential on the device. Use the platform secure storage (iOS Keychain, Android Keystore) and a slow KDF like Argon2id for any password-derived material.
      • Key rotation. If you bundle JWKS into the app, you have to ship app updates ahead of key rotations (or plan to create a bunch of keys ahead of time). If you fetch JWKS dynamically, you need a cache strategy and a fallback when the cache is stale and the network is down.
      • MFA degrades offline. Push and SMS-based factors require connectivity. Offline auth typically falls back to device-bound factors (the refresh token + a local PIN/biometric), which is different than your online MFA flow. Decide whether that's acceptable.

      Practical starting point

      Here's an example of the configuration:

      • Access token TTL: 15 minutes
      • Refresh token: 30 days, sliding window, one-time use
      • Offline grace period (app-enforced): 24 hours past exp
      • JWKS: fetched on first launch, refreshed weekly when online, with a bundled fallback
      • Mandatory online check-in: every 7 days (refuse to operate offline beyond this)

      Tighten the numbers for higher-sensitivity apps, loosen them for field-work apps where availability matters more than instant revocation.

      Some further reading for you:

      • Building a Secure JWT
      • Revoking JWTs
      • Token storage best practices
      • Air-gapping FusionAuth

      The short version: FusionAuth gives you all the primitives:

      • asymmetric signing
      • JWKS
      • configurable lifetimes
      • refresh token revocation

      The offline policy is yours to design, and the design is mostly about choosing how much revocation lag you can tolerate in exchange for how much offline runway your users need.

      posted in Q&A
      danD
      dan
    • offline access/authentication

      I'm building a mobile app that needs to work in places with spotty or no connectivity (think field workers, transit, rural areas).

      Can I use FusionAuth as my central identity provider while still letting users authenticate when the device is offline?

      posted in Q&A
      danD
      dan
    • RE: OIDC Certificate vs. Secret

      @tschlegel

      Yes, there's currently no support for using a certificate.

      Here's an open tracking issue: https://github.com/FusionAuth/fusionauth-issues/issues/3083

      Please comment and/or upvote this with any other details that would help the product team prioritize this.

      posted in General Discussion
      danD
      dan
    • RE: Feedback: Tailwind

      Thanks for taking the time to chat with me.

      I'm sharing the feedback internally, but for future folks there were multiple issues.

      • The theme was built on tweaks to the standard UI, and was moving from pre 1.62 to post 1.62. Due to the massive changes in the default theme, this was problematic.
      • The way the tailwind CSS is set up and built, it's more difficult to override the default styles wholesale now.
      • Additionally, it is hard to create CSS selectors to target just certain elements.

      @elliotdickison please keep me honest and let me know if I missed something.

      posted in Comments & Feedback
      danD
      dan
    • RE: Send custom query param to identity provider (screen_hint)

      @elliotdickison I'd probably try with two Identity Providers configurations in FusionAuth both pointing to the same remote IDP.

      One can have screen_hint=abc on the authorization URL and the other can have screen_hint=def, but both will have all the other parameters the same.

      Then you can use an idp_hint on your create or login buttons.

      I think that will work, but please let us know.

      posted in Q&A
      danD
      dan
    • RE: Feedback: Tailwind

      @elliotdickison Thanks for the feedback.

      I'd love to chat a bit more to understand the problem.

      Will send you an email.

      posted in Comments & Feedback
      danD
      dan
    • RE: Getting changes from theme updates

      Because advanced themes are so customizable, they can be hard to upgrade. Here's some ways to make it easier.

      • When you create a new theme, start from the default version. Commit it to git before you change anything.
      • Use the FusionAuth CLI to download/upload your theme during development and CI/CD.
      • When a new theme comes out, clone or pull the latest from the theme history repo.
      • Run this command to see what has changed: git format-patch 1.61.0..1.64.1 --stdout > update-themes.patch (this shows the changes between 1.61.0 and 1.64.1; adjust as needed for your installed version and the target version).
      • Go to your theme git repo and apply the changes: git am --3way update-themes.patch which will attempt to automatically merge the changes. If there are conflicts, you can resolve them manually and then run git am --continue.

      You can also use a 3 way diffing tool like diff3 or kdiff3 to visualize the changes.

      These upgrade notes also provide detailed human friendly instructions on the changes.

      posted in Q&A
      danD
      dan
    • Getting changes from theme updates

      I am using advanced themes and wanted to know how to find out what had changed in the themed pages when a new release happens.

      I've read the instructions here.

      posted in Q&A
      danD
      dan
    • RE: Application is blank on the login records

      There are a couple different scenarios where a login record could have a blank application Id. Usually it is #1 or #2. It occurs in scenarios where the user can have a JWT/access token that does not have the application Id in it.

      1. If a user is not registered for the Application they are logging into
      2. FusionAuth makes a login record when a user is created since FA makes a JWT upon user creation
      3. If you use the Login API, you can log in without an App ID because you don't have to provide an application on the API call.
      posted in Q&A
      danD
      dan
    • Application is blank on the login records

      We have a user who has logged in repeatedly, but the application is blank.

      https://fusionauth.io/docs/apis/login#search-login-records doesn't mention anything about this.

      What gives?

      posted in Q&A login user application blank
      danD
      dan
    • RE: Importing users over time

      I think the way I'd approach this is:

      • import all users into FusionAuth

      At cutover time:

      • look at local database to see which password hashes had changed
      • pull the user data from FusionAuth for each of these users
      • delete the user
      • re-import the user with the new password hash and the FusionAuth data, maintaining the same userId (if you provide the UUID, we'll use that)

      I get that is an additional complexity, but hopefully that helps.

      posted in Q&A
      danD
      dan
    • Importing users over time

      I have a large number of users. I want to import them into FusionAuth with their password hashes and the accompanying data like the factor.

      But my cutover is going to be slow, so I expect some percentage of people to change their password hashes after the import.

      So I'd like synchronize any password hashes that changed in the meantime, and then roll out FusionAuth.

      I can't re-import password hashes for an existing user, and the User API doesn't let me update passwords hashes, per this closed issue: https://github.com/FusionAuth/fusionauth-issues/issues/348

      What would you recommend?

      posted in Q&A migration passwords hashed password hashes
      danD
      dan