AuthKit with Astro
🌱 This post is in the growth phase. It may still be useful as it grows up.
These instructions are a step-by-step guide to setting up AuthKit with Astro. Each step will result in some observable change that should illustrate completion.
The guide tracks each steup of the WorkOS SSO authentiaction flow:

Contents
- Warning
- Set up environment
- Direct users to Hosted AuthKit
- Create auth callback endpoint
- Encrypt session
- Create single protected page
- Automatically refresh session with session refreshToken
- Extract auth check into framework middleware
Warning
As of this writing, @workos-inc/node v7 has an issue that causes it to fail in Cloudflare Workers.
The current workaround is to downgrade to v6 — which has everything needed for this tutorial.
Set up environment
Install WorkOS Node SDK
npm i @workos-inc/nodeSet secrets in local environment
WORKOS_API_KEY=#COPY FROM WORKOS DASHBOARDWORKOS_CLIENT_ID=#COPY FROM WORKOS DASHBOARDWORKOS_REDIRECT_URI=#LOCAL PATH TO AUTH CALLBACK ENDPOINTWORKOS_COOKIE_PASSWORD=#32 RANDOM CHARACTER PASSWORDDirect users to Hosted AuthKit
Create /sign-in redirect endpoint
import type {APIRoute} from 'astro'
export const GET: APIRoute = async () => { return new Response( '/sign-in redirect endpoint. Not Implemented.' )}
// disable prerendering in 'hyrbrid' modeexport const prerender = falseGenerate the authorization URL
import type {APIRoute} from 'astro'import {WorkOS} from '@workos-inc/node'
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
export const GET: APIRoute = async () => { const authorizationUrl = workos.userManagement.getAuthorizationUrl({ provider: 'authkit', redirectUri: import.meta.env.WORKOS_REDIRECT_URI, clientId: import.meta.env.WORKOS_CLIENT_ID, })
return new Response( '/sign-in redirect endpoint. Not Implemented.', authorizationUrl, )}Redirect user to authorization URL
export const GET: APIRoute = async ({redirect}) => { const authorizationUrl = workos.userManagement.getAuthorizationUrl({ provider: 'authkit', redirectUri: import.meta.env.WORKOS_REDIRECT_URI, clientId: import.meta.env.WORKOS_CLIENT_ID, })
return new Response(authorizationUrl) return redirect(authorizationUrl)}Final /sign-in redirect endpoint
import {WorkOS} from '@workos-inc/node'import type {APIRoute} from 'astro'
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
export const GET: APIRoute = async ({redirect}) => { const authorizationUrl = workos.userManagement.getAuthorizationUrl({ provider: 'authkit', redirectUri: import.meta.env.WORKOS_REDIRECT_URI, clientId: import.meta.env.WORKOS_CLIENT_ID, })
return redirect(authorizationUrl)}
// required in `hybrid` rendering modeexport const prerender = falseCreate auth callback endpoint
import type {APIRoute} from 'astro'
export const GET: APIRoute = async ({}) => { return new Response( 'Auth callback endpoint. Not implemented.' )}Extract authentication code request to redirect URI
export const GET: APIRoute = async ({request}) => { const code = String( new URL(request.url).searchParams.get('code') )
return new Response( 'Auth callback endpoint. Not implemented.' code )}Exchange authorization code for user Profile
import type {APIRoute} from 'astro'import {WorkOS} from '@workos-inc/node'
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
export const GET: APIRoute = async ({request}) => { const code = String( new URL(request.url).searchParams.get('code') )
const session = await workos.userManagement.authenticateWithCode({ code, clientId: import.meta.env.WORKOS_CLIENT_ID, })
return new Response(code) return new Response(JSON.stringify(session))}Encrypt session
import type {APIRoute} from 'astro'import {WorkOS} from '@workos-inc/node'import {sealData} from 'iron-session'
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
export const GET: APIRoute = async ({request}) => { const code = String( new URL(request.url).searchParams.get('code') ) const session = await workos.userManagement.authenticateWithCode({ code, clientId: import.meta.env.WORKOS_CLIENT_ID, })
const encryptedSession = await sealData(session, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
return new Response(session) return new Response(encryptedSession)}Set cookie, using encrypted session
export const GET: APIRoute = async ({ request, cookies,}) => { const code = String( new URL(request.url).searchParams.get('code') ) const session = await workos.userManagement.authenticateWithCode({ code, clientId: import.meta.env.WORKOS_CLIENT_ID, })
const encryptedSession = await sealData(session, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
cookies.set('wos-session', encryptedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', })
return new Response(encryptedSession)}Redirect user to authenticated route
export const GET: APIRoute = async ({ request, redirect, cookies,}) => { const code = String( new URL(request.url).searchParams.get('code') ) const session = await workos.userManagement.authenticateWithCode({ code, clientId, })
const encryptedSession = await sealData(session, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
cookies.set('wos-session', encryptedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', })
return new Response(encryptedSession) return redirect('/dashboard')}Final auth callback endpoint
import type {APIRoute} from 'astro'import {WorkOS} from '@workos-inc/node'import {sealData} from 'iron-session'
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
export const GET: APIRoute = async ({ request, redirect, cookies,}) => { const code = String( new URL(request.url).searchParams.get('code') ) const session = await workos.userManagement.authenticateWithCode({ code, clientId: import.meta.env.WORKOS_CLIENT_ID, })
const encryptedSession = await sealData(session, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
cookies.set('wos-session', encryptedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', })
return redirect('/dashboard')}
// required in `hybrid` rendering modeexport const prerender = falseCreate single protected page
---// disable prerendering in 'hyrbrid' modeexport const prerender = false---
<pre><code>{JSON.stringify('Not implemented.', null, '\t')}</code></pre>Read encrypted session from cookie. Redirect in not present.
---// disable prerendering in 'hyrbrid' modeexport const prerender = false
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}---<pre><code>{JSON.stringify("Not implemented"cookie, null, '\t')}</code></pre>Decript session
---import {unsealData} from 'iron-session'
// disable prerendering in 'hyrbrid' modeexport const prerender = false
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD,})---<pre><code>{JSON.stringify(cookiesession, null, '\t')}</code></pre>Verify the user session with a JWT
---import {WorkOS} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'
import {unsealData} from 'iron-session'
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD,})
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
const JWKS = createRemoteJWKSet( new URL( workos.userManagement.getJwksUrl( import.meta.env.WORKOS_CLIENT_ID ) ))
let verifiedSession = await jwtVerify(session.accessToken, JWKS)
export const prerender = false---
<pre><code>{JSON.stringify(sessionverifiedSession, null, '\t')}</code></pre>Redirect to /sign-in route if session is invalid
let verifiedSession = await jwtVerify(session.accessToken, JWKS)let verifiedSession
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { return Astro.redirect('/sign-in')}Display session data
<pre><code>{JSON.stringify(verifiedSession, null, '\t')}</code></pre><h1>Hello {session.user.lastName}!</h1>Final protected user page
---import {WorkOS} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'
import {unsealData} from 'iron-session'
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD,})
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
const JWKS = createRemoteJWKSet( new URL( workos.userManagement.getJwksUrl( import.meta.env.WORKOS_CLIENT_ID ) ))
let verifiedSession
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { return Astro.redirect('/sign-in')}
export const prerender = false---
<h1>Hello {session.user.first_name} {session.user.last_name}!</h1>Automatically refresh session with session refreshToken
---import {WorkOS} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'
import {sealData, unsealData} from 'iron-session'
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD,})
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
const JWKS = createRemoteJWKSet( new URL( workos.userManagement.getJwksUrl( import.meta.env.WORKOS_CLIENT_ID ) ))
let verifiedSession
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken({ clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, })
const encryptedRefreshedSession = await sealData( refreshedSession, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, } )
Astro.cookies.set( 'wos-session', encryptedRefreshedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', } ) } catch (e) { return Astro.redirect('/sign-in') }}
export const prerender = false---
<h1> Hello {session.user.last_name}!</h1>Let’s break that down.
Set access token duration in the WorkOS dashboard
By default, WorkOS sessions require refreshing every 5 minutes.
That duration can be configured in the WorkOS dashboard.
To build our integration, we’ll set the duration to the minimum value of 1 minute.

Attempt to refresh session if jwtVerify fails
Once authenticated, our access token is now valid for 1 minute. Add a an early reaturn to observe the error.
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { return new Response(e); return Astro.redirect('/sign-in')}When verification fails, we’ll see this error:
JWTExpired: "exp" claim timestamp check failedAttempt to refresh session
Add a try-catch block to refresh the session.
For starters, let’s render the session.refreshToken to ensure we have the value in scope.
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { try { return new Response(session.refreshToken); } catch (e) { return new Response(e); return Astro.redirect('/sign-in') }}Authenticate with refresh token
In the try block, call the authenticateWithRefreshToken method with the refresh token.
try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken({ clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, });
return new Response(session.refreshTokenrefreshedSession);}Encrypt the refreshed session
try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken({ clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, });
const encryptedRefreshedSession = await sealData( refreshedSession, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, } )
return new Response(refreshedSessionencryptedRefreshedSession);}Set cookie with new encrypeted session
try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken({ clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, });
const encryptedRefreshedSession = await sealData( refreshedSession, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, } )
Astro.cookies.set( 'wos-session', encryptedRefreshedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', } );
return new Response(refreshedSessionencryptedRefreshedSession); console.log('session refreshed successfully')} catch (e) { return new Response(e); return Astro.redirect('/sign-in')Extract auth check into framework middleware
Create Auth Middleware
import {defineMiddleware} from 'astro:middleware'
export const onRequest = defineMiddleware( async (context, next) => { return next() })Skip middleware for un-protected routes
import {defineMiddleware} from 'astro:middleware'import match from 'picomatch'
export const onRequest = defineMiddleware( async (context, next) => { if ( !match('/dashboard*')( String(new URL(context.request.url).pathname) ) ) { return next() }
return next() })Move page-specific auth into middleware.ts (changing Astro global to context)
---import {WorkOS} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'import {sealData, unsealData} from 'iron-session'
const cookie = Astro.cookies.get('wos-session')
if (!cookie) { return Astro.redirect('/sign-in')}
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD,})
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
const JWKS = createRemoteJWKSet( new URL( workos.userManagement.getJwksUrl( import.meta.env.WORKOS_CLIENT_ID ) ))
let verifiedSession
try { verifiedSession = await jwtVerify(session.accessToken, JWKS)} catch (e) { try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken({ clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, })
const encryptedRefreshedSession = await sealData( refreshedSession, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, } )
Astro.cookies.set( 'wos-session', encryptedRefreshedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', } ) } catch (e) { return Astro.redirect('/sign-in') }}
export const prerender = false---
<h1> Hello {session.user.last_name}!</h1>import {defineMiddleware} from 'astro:middleware'import match from 'picomatch'import {WorkOS} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'import {sealData, unsealData} from 'iron-session'
export const onRequest = defineMiddleware( async (context, next) => { if ( !match('/dashboard*')( String(new URL(context.request.url).pathname) ) ) { return next() }
const cookie = context.cookies.get('wos-session')
if (!cookie) { return context.redirect('/sign-in') }
const session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
const workos = new WorkOS(import.meta.env.WORKOS_API_KEY)
const JWKS = createRemoteJWKSet( new URL( workos.userManagement.getJwksUrl( import.meta.env.WORKOS_CLIENT_ID ) ) )
let verifiedSession
try { verifiedSession = await jwtVerify( session.accessToken, JWKS ) } catch (e) { try { const refreshedSession = await workos.userManagement.authenticateWithRefreshToken( { clientId: import.meta.env.WORKOS_CLIENT_ID, refreshToken: session.refreshToken, } ) const encryptedRefreshedSession = await sealData( refreshedSession, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, } ) context.cookies.set( 'wos-session', encryptedRefreshedSession, { path: '/', httpOnly: true, secure: true, sameSite: 'lax', } ) } catch (e) { return context.redirect('/sign-in') } }
return next() })NOTE: we should probably eliminate the other session grab in the pgaes first
Add type data
(Best place for this is in workos-next)[https://github.com/workos/authkit-nextjs/blob/main/src/interfaces.ts]
import {defineMiddleware} from 'astro:middleware'import match from 'picomatch'import {WorkOS} from '@workos-inc/node'import type {User} from '@workos-inc/node'import {createRemoteJWKSet, jwtVerify} from 'jose'import {sealData, unsealData} from 'iron-session'
interface Session { accessToken: string refreshToken: string user: User}
export const onRequest = defineMiddleware( async (context, next) => { // ...folded
const session: Session = await unsealData(cookie.value, { password: import.meta.env.WORKOS_COOKIE_PASSWORD, })
// ...folded return next() })