Auth

Login with Kakao


To enable Kakao Auth for your project, you need to set up an Kakao OAuth application and add the application credentials to your Supabase Dashboard.

Overview

Kakao OAuth consists of six broad steps:

  • Create and configure your app in the Kakao Developer Portal.
  • Obtaining a REST API key - this will serve as the client_id.
  • Generating the Client secret code - this will serve as the client_secret.
  • Additional configurations on Kakao Developers Portal.
  • Add your client id and client secret keys to your Supabase Project.
  • Add the login code to your Supabase JS Client App.

Access your Kakao Developer account

Kakao Developers Portal.

Create and configure your app

  • Go to My Application.
  • Click on Add an application at the top.
  • Fill out your app information:
    • App icon.
    • App name.
    • Company name.
  • Click Save at the bottom right.

Obtain a REST API key

This will serve as the client_id when you make API calls to authenticate the user.

  • Go to My Application.
  • Click on your app.
  • You will be redirected to Summary tab of your app.
  • In the App Keys section you will see REST API key -- this ID will become your client_id later.

Find your callback URL

The next step requires a callback URL, which looks like this: https://<project-ref>.supabase.co/auth/v1/callback

  • Go to your Supabase Project Dashboard
  • Click on the Authentication icon in the left sidebar
  • Click on Providers under the Configuration section
  • Click on Kakao from the accordion list to expand and you'll find your Callback URL, you can click Copy to copy it to the clipboard
  • To add callback URL on Kakao, go to Product settings > Kakao Login > Redirect URI.

Generate and activate a client_secret

  • Go to Product settings > Kakao Login > Security.
  • Click on the Kakao Login switch to enable Kakao Login.
  • Click on generate code at the bottom to generate the Client secret code -- this will serve as a client_secret for your Supabase project.
  • Make sure you enabled Client secret code by selecting enable from the Activation state section.

Additional configurations on Kakao Developers portal

  • Make sure the Kakao Login is enabled in the Kakao Login tab.
  • Set following scopes under the "Consent Items": account_email, profile_image, profile_nickname

Consent items needs to be set.

Add your OAuth credentials to Supabase

  • Go to your Supabase Project Dashboard
  • In the left sidebar, click the Authentication icon (near the top)
  • Click on Providers under the Configuration section
  • Click on Kakao from the accordion list to expand and turn Kakao Enabled to ON
  • Enter your Kakao Client ID and Kakao Client Secret saved in the previous step
  • Click Save

Add login code to your client app

When your user signs in, call signInWithOAuth() with kakao as the provider:

1
2
3
4
5
async function signInWithKakao() { const { data, error } = await supabase.auth.signInWithOAuth({ provider: 'kakao', })}

For a PKCE flow, for example in Server-Side Auth, you need an extra step to handle the code exchange. When calling signInWithOAuth, provide a redirectTo URL which points to a callback route. This redirect URL should be added to your redirect allow list.

In the browser, signInWithOAuth automatically redirects to the OAuth provider's authentication endpoint, which then redirects to your endpoint.

1
2
3
4
5
6
await supabase.auth.signInWithOAuth({ provider, options: { redirectTo: `http://example.com/auth/callback`, },})

At the callback endpoint, handle the code exchange to save the user session.

Create a new file at app/auth/callback/route.ts and populate with the following:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
import { NextResponse } from 'next/server'// The client you created from the Server-Side Auth instructionsimport { createClient } from '@/utils/supabase/server'export async function GET(request: Request) { const { searchParams, origin } = new URL(request.url) const code = searchParams.get('code') // if "next" is in param, use it as the redirect URL const next = searchParams.get('next') ?? '/' if (code) { const supabase = await createClient() const { error } = await supabase.auth.exchangeCodeForSession(code) if (!error) { const forwardedHost = request.headers.get('x-forwarded-host') // original origin before load balancer const isLocalEnv = process.env.NODE_ENV === 'development' if (isLocalEnv) { // we can be sure that there is no load balancer in between, so no need to watch for X-Forwarded-Host return NextResponse.redirect(`${origin}${next}`) } else if (forwardedHost) { return NextResponse.redirect(`https://${forwardedHost}${next}`) } else { return NextResponse.redirect(`${origin}${next}`) } } } // return the user to an error page with instructions return NextResponse.redirect(`${origin}/auth/auth-code-error`)}

When your user signs out, call signOut() to remove them from the browser session and any objects from localStorage:

1
2
3
async function signOut() { const { error } = await supabase.auth.signOut()}

Using Kakao Login JS SDK

Kakao Login JS SDK is an official Kakao SDK for authenticating Kakao users on websites.

Exchange the authorization code returned by Kakao API for an ID Token.

For example, this code shows a how to get ID Token:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
const requestUrl = new URL(request.url);const code = requestUrl.searchParams.get('code');if (code) { const res = await fetch('https://kauth.kakao.com/oauth/token', { method: 'POST', headers: { 'Content-Type': 'application/x-www-form-urlencoded;charset=utf-8', }, body: new URLSearchParams({ grant_type: 'authorization_code', client_id: '<CLIENT_ID>', redirect_uri: '<url>/api/auth/kakao/oidc', code, client_secret: '<CLIENT_SECRET>', }), }); const {id_token} = await res.json();}

Use the ID Token to sign in:

1
2
3
4
const res = await auth.signInWithIdToken({ provider: 'kakao', token: id_token,});

Configuration

  1. Set 'State' to 'ON' under OpenID Connect Activation on Kakao Developers portal Application Dashboard.
  2. Add openid to scope along with the scope values you wish to obtain consent for.

Resources