Auth

Identity Linking

Manage the identities associated with your user

The user identity

The user identity represents an authentication method associated to the user. For example, if a user signs in using their email, an email identity will be associated with the user.

The user identity object contains the following attributes:

AttributesTypeDescription
idstringThe provider id returned by the provider. If the provider is an OAuth provider, the id refers to the user's account with the OAuth provider. If the provider is email or phone, the id is the user's id from the auth.users table.
user_idstringThe user's id that the identity is linked to.
identity_dataobjectThe identity metadata.
identity_idstringThe unique id of the identity.
providerstringThe provider name.
created_atstringThe timestamp that the identity was created.
last_sign_in_atstringThe timestamp that the identity was last used to sign in.
updated_atstringThe timestamp that the identity was last updated.

Identity linking strategies

Currently, Supabase Auth supports 2 strategies to link an identity to a user:

  1. Automatic Linking
  2. Manual Linking

Automatic linking

Supabase Auth automatically links identities with the same email address to a single user. This helps to improve the user experience when multiple OAuth login options are presented since the user does not need to remember which OAuth account they used to sign up with. When a new user signs in with OAuth, Supabase Auth will attempt to look for an existing user that uses the same email address. If a match is found, the new identity is linked to the user.

In order for automatic linking to correctly identify the user for linking, Supabase Auth needs to ensure that all user emails are unique. It would also be an insecure practice to automatically link an identity to a user with an unverified email address since that could lead to pre-account takeover attacks. To prevent this from happening, when a new identity can be linked to an existing user, Supabase Auth will remove any other unconfirmed identities linked to an existing user.

Users that signed up with SAML SSO will not be considered as targets for automatic linking.

Manual linking (beta)

Supabase Auth allows a user to initiate identity linking with a different email address when they are logged in. To link an OAuth identity to the user, call linkIdentity():


_10
const { data, error } = await supabase.auth.linkIdentity({ provider: 'google' })

In the example above, the user will be redirected to Google to complete the OAuth2.0 flow. Once the OAuth2.0 flow has completed successfully, the user will be redirected back to the application and the Google identity will be linked to the user. You can enable manual linking from your project's authentication configuration options or by setting the environment variable GOTRUE_SECURITY_MANUAL_LINKING_ENABLED: true when self-hosting.

You can use getUserIdentities() to fetch all the identities linked to a user. Then, call unlinkIdentity() to unlink the identity. The user needs to be logged in and have at least 2 linked identities in order to unlink an existing identity.


_10
// retrieve all identities linked to a user
_10
const {
_10
data: { identities },
_10
} = await supabase.auth.getUserIdentities()
_10
_10
// find the google identity linked to the user
_10
const googleIdentity = identities.find((identity) => identity.provider === 'google')
_10
_10
// unlink the google identity from the user
_10
const { data, error } = await supabase.auth.unlinkIdentity(googleIdentity)