Skip to main content

Typescript Repository

To replace our current golang built login UI and showcase the use of our new resource, session and OIDC APIs, we've created the Typescript Repository. The typescript repository contains all TypeScript and JavaScript packages and applications you need to create your own Login UI using the ZITADEL APIs. The repo implements the OIDC standard

Included Apps And Packages​

  • login: The future login UI used by ZITADEL Cloud, powered by Next.js
  • @zitadel/server: core components for establishing node client connection, grpc stub
  • @zitadel/client: core components for establishing web client connection, grpc stub
  • @zitadel/react: shared React utilities and components built with Tailwind CSS
  • @zitadel/next: shared Next.js utilities
  • @zitadel/tsconfig: shared tsconfig.jsons used throughout the monorepo
  • eslint-config-zitadel: ESLint preset

Implemented features of OIDC Standard​

  • Authorization Code Flow with PKCE
  • AuthRequest hintUserId
  • AuthRequest loginHint
  • AuthRequest prompt
    • Login
    • Select Account
    • Consent
    • Create
  • Scopes
    • `openid email profile address``
    • offline access
    • urn:zitadel:iam:org:idp:id:{idp_id}
    • urn:zitadel:iam:org:project:id:zitadel:aud
    • urn:zitadel:iam:org:id:{orgid}
  • AuthRequest UI locales
  • Multifactor
    • Passkeys
    • TOTP
  • Passwordless
    • Passkeys
  • Security Prompts
    • Setup Passkey as Passwordless method
    • Setup TOTP as Multifactor
    • Password Change
  • Login
    • Email Password
    • Passkey
    • IDPs
      • Google
      • GitHub
      • GitLab
      • Azure
      • Apple
  • Register
    • Email Password
    • Passkey

How to setup domains​

In order to use the new login app, the domain must be registered on your instance and use https. If you are using a self hosted instance, install your domain on your instance using the system service.

The login using our cloud service is still experimental, but you can purchase your domain on zitadel.com, install it on your domain following our guide. After your domain has been verified, you can reconfigure your DNS settings in order to deploy the login on your own.