This guide helps you migrate from Authorizer v1 to v2. The current branch is released as v2.
| Area | v1 | v2 |
|---|---|---|
| Configuration | Environment persisted in cache/DB; configurable via dashboard, .env, or OS envs |
All configuration via CLI root arguments only; no env in cache or DB |
| Secrets | Could be stored in DB/cache (e.g. via dashboard) | Passed securely at process start via CLI args (no persistence of config in storage) |
| Dashboard | Could update many env vars from dashboard | Dashboard cannot change server config; use CLI args (or platform env → args) |
| Admin / JWT setup | _admin_signup, _update_env, _generate_jwt_keys mutations |
Deprecated; configure via CLI args before first run |
In v1, environment and configuration could be:
- Loaded from
.envor OS environment variables - Stored (in encrypted form) in cache (e.g. Redis) or database via the dashboard or
_update_envmutation, to share config across multiple replicas
In v2:
- All configuration is passed at server start via CLI root arguments.
- Nothing is read from a persisted “env store” in cache or DB.
- This improves security: secrets and config are not stored in your database or cache and are supplied explicitly at startup (e.g. via your orchestrator or a wrapper script).
- Copy all env configs set via the v1 dashboard. Before migrating, retrieve your current v1 configuration and pass each value as a CLI flag in v2.
⚠️ Critical — do not skip this step. You must capture all your v1 env variables before migrating. Missing values will cause the v2 server to fail or behave incorrectly, and you will not be able to recover them after shutting down v1. How to get your current env variables
- Option 1: Using the API
Query the_envGraphQL field with your admin secret:curl --location 'YOUR_AUTHORIZER_URL/graphql' \ --header 'x-authorizer-admin-secret: YOUR_ADMIN_SECRET' \ --header 'Content-Type: application/json' \ --data '{ "query": "{\n _env {\n CLIENT_ID\n CLIENT_SECRET\n GOOGLE_CLIENT_ID\n GOOGLE_CLIENT_SECRET\n GITHUB_CLIENT_ID\n GITHUB_CLIENT_SECRET\n FACEBOOK_CLIENT_ID\n FACEBOOK_CLIENT_SECRET\n LINKEDIN_CLIENT_ID\n LINKEDIN_CLIENT_SECRET\n APPLE_CLIENT_ID\n APPLE_CLIENT_SECRET\n DISCORD_CLIENT_ID\n DISCORD_CLIENT_SECRET\n TWITTER_CLIENT_ID\n TWITTER_CLIENT_SECRET\n MICROSOFT_CLIENT_ID\n MICROSOFT_CLIENT_SECRET\n MICROSOFT_ACTIVE_DIRECTORY_TENANT_ID\n TWITCH_CLIENT_ID\n TWITCH_CLIENT_SECRET\n ROBLOX_CLIENT_ID\n ROBLOX_CLIENT_SECRET\n DEFAULT_ROLES\n PROTECTED_ROLES\n ROLES\n JWT_TYPE\n JWT_SECRET\n JWT_ROLE_CLAIM\n JWT_PRIVATE_KEY\n JWT_PUBLIC_KEY\n REDIS_URL\n SMTP_HOST\n SMTP_PORT\n SMTP_USERNAME\n SMTP_PASSWORD\n SMTP_LOCAL_NAME\n SENDER_EMAIL\n SENDER_NAME\n ALLOWED_ORIGINS\n ORGANIZATION_NAME\n ORGANIZATION_LOGO\n ADMIN_SECRET\n APP_COOKIE_SECURE\n ADMIN_COOKIE_SECURE\n DISABLE_LOGIN_PAGE\n DISABLE_MAGIC_LINK_LOGIN\n DISABLE_EMAIL_VERIFICATION\n DISABLE_BASIC_AUTHENTICATION\n DISABLE_MOBILE_BASIC_AUTHENTICATION\n DISABLE_SIGN_UP\n DISABLE_STRONG_PASSWORD\n DISABLE_REDIS_FOR_ENV\n CUSTOM_ACCESS_TOKEN_SCRIPT\n DATABASE_NAME\n DATABASE_TYPE\n DATABASE_URL\n ACCESS_TOKEN_EXPIRY_TIME\n DISABLE_MULTI_FACTOR_AUTHENTICATION\n ENFORCE_MULTI_FACTOR_AUTHENTICATION\n DEFAULT_AUTHORIZE_RESPONSE_TYPE\n DEFAULT_AUTHORIZE_RESPONSE_MODE\n DISABLE_PLAYGROUND\n DISABLE_TOTP_LOGIN\n DISABLE_MAIL_OTP_LOGIN\n __typename\n }\n}", "variables": {} }'
- Option 2: Copy from dashboard
Go through your v1 dashboard settings and copy every value you configured. You will need to pass each as a CLI flag in v2. This includes: - OAuth / app:
client_id,client_secret,admin_secret - Social / OAuth providers: Google, GitHub, Facebook, Microsoft, Apple, LinkedIn, Discord, Twitter, Twitch, Roblox client IDs and secrets
- Roles:
roles,default_roles,protected_roles - JWT:
jwt_type,jwt_secret(orjwt_private_key/jwt_public_key) - Session / memory store:
redis_url(if using Redis) - Email / SMTP:
smtp_host,smtp_port,smtp_username,smtp_password,smtp_sender_email,smtp_sender_name - Domain / origins:
allowed_origins - Access token custom scripts:
custom_access_token_script
Pass all of these as CLI args at startup for a smooth transition.
- Stop relying on dashboard or
_update_envfor server configuration. In v2, the server does not load or save config from/to DB or cache. Configure everything when starting the server. - Map your current v1 env vars to v2 CLI flags. Use the Configuration mapping below and pass options when starting the binary (see Running the server).
- Ensure required flags are set at startup.
In v2,
--client-idand--client-secretare required; the server will exit if they are missing.
# .env or OS env
export DATABASE_TYPE=sqlite
export DATABASE_URL=data.db
export CLIENT_ID=...
export CLIENT_SECRET=...
./build/serverOr: configure via dashboard after first run.
Pass all config as CLI arguments when starting the server binary (e.g. the v2 authorizer binary):
./build/authorizer \
--database-type=sqlite \
--database-url=data.db \
--client-id=YOUR_CLIENT_ID \
--client-secret=YOUR_CLIENT_SECRET \
--admin-secret=your-admin-secret \
--jwt-type=HS256 \
--jwt-secret=your-jwt-secretFor local development (from repo root):
make dev
# or
go run main.go --database-type=sqlite --database-url=test.db \
--jwt-type=HS256 --jwt-secret=test --admin-secret=admin \
--client-id=123456 --client-secret=secretThe v2 server does not read from .env or from a fixed set of OS env vars. To keep using env vars in your deployment:
- Option A: Set env vars in your platform (e.g. Docker, K8s, Railway) and pass them into the process as arguments, e.g. a wrapper script or
envsubst:./build/authorizer \ --database-type="$DATABASE_TYPE" \ --database-url="$DATABASE_URL" \ --client-id="$CLIENT_ID" \ --client-secret="$CLIENT_SECRET" \ ...
- Option B: Use your platform’s way of injecting env into the command line (e.g. Docker
CMDor Kubernetes command/args that reference env).
Example Docker run:
docker run -p 8080:8080 \
-e DATABASE_TYPE=postgres \
-e DATABASE_URL="postgres://..." \
-e CLIENT_ID=... \
-e CLIENT_SECRET=... \
your-authorizer-image \
./authorizer \
--database-type="$DATABASE_TYPE" \
--database-url="$DATABASE_URL" \
--client-id="$CLIENT_ID" \
--client-secret="$CLIENT_SECRET" \
--admin-secret="$ADMIN_SECRET"(Adjust image path and env names to match your setup.)
You can build the v2 binary (and optional dashboards) directly from source.
- Go >= 1.24 (see
go.mod) - Node.js >= 18 and npm / pnpm / yarn (only required if you want to build the web UIs)
- Clone the repo
git clone https://github.com/authorizerdev/authorizer.git
cd authorizer- Build the server binary
go build -o build/authorizer .This produces build/authorizer, matching the entrypoint name used in the Docker image.
3. (Optional) Build the web app and dashboard
cd web/app && npm ci && npm run build
cd ../dashboard && npm ci && npm run build
cd ../.. # back to repo root- Run the server with CLI args
./build/authorizer \
--database-type=sqlite \
--database-url=data.db \
--client-id=YOUR_CLIENT_ID \
--client-secret=YOUR_CLIENT_SECRET \
--admin-secret=your-admin-secretAdjust flags as needed for your environment (see the configuration mapping below).
Use these v2 CLI flags instead of v1 env or dashboard config. Flag names use kebab-case (e.g. --database-url).
database_url→ use--database-urldatabase_type→ use--database-typeenv_file→ no longer supported; do not uselog_level→ use--log-levelredis_url→ use--redis-url
| v1 (env or behavior) | v2 CLI flag |
|---|---|
ENV |
--env |
PORT |
--http-port (default: 8080) |
| Host | --host (default: 0.0.0.0) |
| Metrics port | --metrics-port (default: 8081) |
| Metrics bind | --metrics-host (default: 127.0.0.1) for the dedicated metrics listener only |
LOG_LEVEL |
--log-level |
Metrics: GET /metrics is always on a separate minimal HTTP server at --metrics-host:--metrics-port (default 127.0.0.1:8081). --http-port and --metrics-port must differ; the main Gin server does not expose /metrics. Use --metrics-host=0.0.0.0 when Prometheus scrapes from another container or pod (keep the metrics port off public load balancers).
Rate limiting: --rate-limit-fail-closed rejects requests with 503 when the rate-limit backend errors; the default remains fail-open (allow) for availability.
| v1 | v2 CLI flag |
|---|---|
DATABASE_TYPE |
--database-type |
DATABASE_URL |
--database-url |
DATABASE_NAME |
--database-name |
DATABASE_USERNAME |
--database-username |
DATABASE_PASSWORD |
--database-password |
DATABASE_HOST |
--database-host |
DATABASE_PORT |
--database-port |
DATABASE_CERT, DATABASE_CA_CERT, DATABASE_CERT_KEY |
--database-cert, --database-ca-cert, --database-cert-key |
| Couchbase | --couchbase-bucket, --couchbase-scope, --couchbase-ram-quota |
| AWS/DynamoDB | --aws-region, --aws-access-key-id, --aws-secret-access-key |
| v1 | v2 CLI flag |
|---|---|
REDIS_URL |
--redis-url |
| v1 | v2 CLI flag |
|---|---|
CLIENT_ID |
--client-id (required) |
CLIENT_SECRET |
--client-secret (required) |
ADMIN_SECRET |
--admin-secret |
ALLOWED_ORIGINS |
--allowed-origins (slice; default *) |
DEFAULT_AUTHORIZE_RESPONSE_TYPE / MODE |
--default-authorize-response-type, --default-authorize-response-mode |
| v1 | v2 CLI flag |
|---|---|
ORGANIZATION_NAME |
--organization-name |
ORGANIZATION_LOGO |
--organization-logo |
DISABLE_LOGIN_PAGE |
--enable-login-page (inverted: use false to disable) |
DISABLE_PLAYGROUND |
--enable-playground (inverted: use false to disable) |
| N/A (GraphQL introspection always on) | --enable-graphql-introspection (default true; set false to disable schema introspection in hardened environments) |
| v1 | v2 CLI flag |
|---|---|
| Roles | --roles, --default-roles, --protected-roles |
DISABLE_STRONG_PASSWORD |
--enable-strong-password (inverted) |
DISABLE_BASIC_AUTHENTICATION |
--enable-basic-authentication (inverted) |
DISABLE_EMAIL_VERIFICATION |
--enable-email-verification (inverted) |
DISABLE_MAGIC_LINK_LOGIN |
--enable-magic-link-login (inverted) |
ENFORCE_MULTI_FACTOR_AUTHENTICATION |
--enforce-mfa, --enable-mfa |
DISABLE_SIGN_UP |
--enable-signup (inverted) |
| TOTP / OTP | --enable-totp-login, --enable-email-otp, --enable-sms-otp |
| Mobile basic auth | --enable-mobile-basic-authentication |
| Phone verification | --enable-phone-verification |
| v1 | v2 CLI flag |
|---|---|
APP_COOKIE_SECURE, ADMIN_COOKIE_SECURE |
--app-cookie-secure, --admin-cookie-secure |
| v1 | v2 CLI flag |
|---|---|
JWT_TYPE |
--jwt-type |
JWT_SECRET |
--jwt-secret |
JWT_PRIVATE_KEY, JWT_PUBLIC_KEY |
--jwt-private-key, --jwt-public-key |
JWT_ROLE_CLAIM |
--jwt-role-claim |
CUSTOM_ACCESS_TOKEN_SCRIPT |
--custom-access-token-script |
| v1 | v2 CLI flag |
|---|---|
SMTP_HOST, SMTP_PORT |
--smtp-host, --smtp-port |
SMTP_USERNAME, SMTP_PASSWORD |
--smtp-username, --smtp-password |
SENDER_EMAIL, SENDER_NAME |
--smtp-sender-email, --smtp-sender-name |
SMTP_LOCAL_NAME |
--smtp-local-name |
| - | --smtp-skip-tls-verification |
| v1 | v2 CLI flag |
|---|---|
TWILIO_ACCOUNT_SID, TWILIO_API_KEY, TWILIO_API_SECRET, TWILIO_SENDER |
--twilio-account-sid, --twilio-api-key, --twilio-api-secret, --twilio-sender |
Each provider is configured with --<provider>-client-id, --<provider>-client-secret, and optionally --<provider>-scopes, e.g.:
--google-client-id,--google-client-secret,--google-scopes--github-client-id,--github-client-secret,--github-scopes--facebook-client-id,--facebook-client-secret,--facebook-scopes--microsoft-client-id,--microsoft-client-secret,--microsoft-tenant-id,--microsoft-scopes--apple-client-id,--apple-client-secret,--apple-scopes--linkedin-client-id,--linkedin-client-secret,--linkedin-scopes--discord-client-id,--discord-client-secret,--discord-scopes--twitter-client-id,--twitter-client-secret,--twitter-scopes--twitch-client-id,--twitch-client-secret,--twitch-scopes--roblox-client-id,--roblox-client-secret,--roblox-scopes
| v1 | v2 CLI flag |
|---|---|
RESET_PASSWORD_URL |
--reset-password-url |
The following flags are new in v2 and help harden your deployment:
**--disable-admin-header-auth**: when set totrue, the server does not acceptX-Authorizer-Admin-Secretas admin authentication; only the secure admin cookie is honored.- Recommended for production:
--disable-admin-header-auth=true.
- Recommended for production:
**--enable-graphql-introspection**: controls whether GraphQL introspection is enabled on/graphql.- Default is
true(for development and tooling). - For locked-down production, you can set
--enable-graphql-introspection=falseto prevent unauthenticated schema discovery.
- Default is
To see all flags and defaults:
./build/authorizer --helpThese mutations and queries exist for compatibility but return an error in v2. Replace or remove calls and use the alternatives below.
| Mutation | v2 behavior | Migration |
|---|---|---|
_update_env |
Returns error: "deprecated. please configure env via cli args" | Configure via CLI flags at startup. |
_admin_signup |
Returns error: "deprecated. please configure admin secret via cli args" | Set admin secret with --admin-secret at startup. |
_generate_jwt_keys |
Returns error: "deprecated. please configure jwt keys via cli args" | Set JWT with --jwt-type, --jwt-secret, or --jwt-private-key / --jwt-public-key at startup. |
mobile_signup |
Returns error: "deprecated, use signup with mobile phone_number" | Use the signup mutation with phone_number instead. |
mobile_login |
Returns error: "deprecated, use login with mobile phone_number" | Use the login mutation with phone_number instead. |
| Query | v2 behavior | Migration |
|---|---|---|
_env |
Returns error: "deprecated. please configure env via cli args" | Do not read env via GraphQL; configuration is via CLI at startup. |
- Admin secret: set with
--admin-secretat startup. - JWT keys/type: set with
--jwt-type,--jwt-secret, or--jwt-private-key/--jwt-public-keyat startup. - All other env: use the corresponding CLI flags when starting the server.
If your app or dashboard calls any of the deprecated mutations or queries above, remove or replace those calls and use the migration guidance in the tables.
- v2 image uses ENTRYPOINT so the server receives CLI arguments at runtime.
- Do not rely on env vars being read by the server; pass config as arguments to the container.
Example:
ENTRYPOINT [ "./authorizer" ]
CMD []Run with args:
docker run -p 8080:8080 your-image \
--database-type=postgres \
--database-url="postgres://user:pass@host/db" \
--client-id=... \
--client-secret=... \
--admin-secret=...Or use a script inside the image that maps env to flags and then runs ./authorizer ....
- Version: v2 uses authorizer-js
3.0.0-rc.1(or compatible v3). - Type renames (breaking):
SignupInput→SignUpRequestLoginInput→LoginRequestVerifyOtpInput→VerifyOTPRequestMagicLinkLoginInput→MagicLinkLoginRequest
- Build/output: CJS/ESM paths may differ; check package
exportsand your bundler.
Upgrade:
npm install @authorizerdev/authorizer-js@^3.0.0-rc.1
# or
pnpm add @authorizerdev/authorizer-js@^3.0.0-rc.1Update imports and types as in the authorizer-react migration notes below.
- Version: use authorizer-react
2.0.0-rc.1(or compatible v2) with authorizer-js v3. - Breaking: Build system (tsdx → tsup), output paths (e.g.
dist/index.cjs,dist/index.mjs), and Node.js >= 18. - Types: Same renames as authorizer-js (e.g.
SignUpRequest,LoginRequest).
Migration (from authorizer-react CHANGELOG):
- Update types if you use them directly:
// Old
import { SignupInput, LoginInput } from '@authorizerdev/authorizer-js';
// New
import { SignUpRequest, LoginRequest } from '@authorizerdev/authorizer-js';- Use Node.js >= 18.
- Rebuild after upgrading.
- authorizer-vue, authorizer-go, authorizer-flutter-sdk, and other repos under the Authorizer org will be updated for v2 compatibility; use versions that explicitly support Authorizer server v2 when available.
- Docs (e.g. in
../docs) will be updated to describe v2 configuration and deployment; refer to the official docs for the latest v2 setup.
The v2 repo ships with a Makefile that wraps the most common development and build workflows.
**make**: runsbuild,build-app, andbuild-dashboard(Go binary + both web UIs).**make bootstrap**: installs Go cross-compilation helpergox.**make build**: cross-compiles theauthorizerbinary for multiple OS/architectures intobuild/<os>/<arch>/authorizer.**make build-app**: builds the embedded login app inweb/app.**make build-dashboard**: builds the admin dashboard inweb/dashboard.**make build-local-image**: builds the Docker image using the currentVERSION(DOCKER_IMAGEdefaults toauthorizerdev/authorizer:$(VERSION)).**make build-push-image**: builds and pushes the Docker image defined byDOCKER_IMAGE.**make dev**: runs the server locally with a SQLite DB and demo secrets (development only).**make clean**: removes thebuilddirectory.**make test**: spins up all supported databases in Docker and runs the full Go test suite, then tears down containers.**make test-mongodb**,**make test-scylladb**,**make test-arangodb**,**make test-dynamodb**,**make test-couchbase**,**make test-all-db**: database-specific (or multi-DB) test runners; they start the corresponding DB(s) in Docker, run integration tests, then clean up containers.**make generate-graphql**: regenerates GraphQL code viagqlgenand runsgo mod tidy.**make generate-db-template**: scaffolds a new DB provider frominternal/storage/db/provider_template(setdbnamewhen invoking).
- Copy all env configs from your v1 dashboard (client_id, client_secret, admin_secret, social provider configs, roles, JWT secrets, session/Redis config, email/SMTP config, allowed_origins, custom_access_token_script) and pass them as CLI args.
- Set
**--client-id**and**--client-secret**(required). - Set
**--admin-secret**and JWT options (**--jwt-type**and**--jwt-secret**or key pair) at startup. - Stop calling
**_update_env**,**_admin_signup**, and**_generate_jwt_keys**; remove or replace with startup config. - Update Docker/K8s/deployment to pass config as CLI args (or via a wrapper that maps env → args).
- Upgrade @authorizerdev/authorizer-js to v3 and @authorizerdev/authorizer-react to v2; update type names and Node version as needed.
- Use kebab-case flags (e.g.
--database-url) and avoid deprecated names (database_url,env_file, etc.). - Re-test admin login, JWT issuance, and any flows that previously depended on dashboard-updated env.
- Authorizer v1 (GitHub): github.com/authorizerdev/authorizer
- authorizer-js: github.com/authorizerdev/authorizer-js (v3.0.0-rc.1)
- authorizer-react: github.com/authorizerdev/authorizer-react (v2.0.0-rc.1, see CHANGELOG.md)
- Docs: docs.authorizer.dev (to be updated for v2)