jQuery Login

Sample Project

Download a sample project specific to this tutorial configured with your Auth0 API Keys.

System Requirements
  • jQuery 3.2.1
Show requirements

This integration guide will walk you through setting up and managing authentication and authorization in your jQuery apps using Auth0.

Get Your Application Keys

When you signed up for Auth0, you were invited to create a new client.

There are some details about this client that your application needs to know about to properly communicate with Auth0, including your Client ID and Domain. You can retrieve these values from the settings area for your client in the Auth0 dashboard.

Please note that if you download the samples available for this tutorial, these keys will be pre-populated for you. If you have created more than one client in your account, the sample will come with the values for your Default App.

App Dashboard

Configure Callback URLs

A callback URL is a URL in your application where Auth0 redirects to after the user has authenticated. You need to whitelist a callback URL for your app in the Callback URLs field in your Client Settings. If no callback URLs are set, a mismatch error will be displayed when a user logs in.

If you are following along with the downloadable sample projects for this tutorial directly, the Callback URL should be set to

http://localhost:3000, http://localhost:5000

Install auth0.js

Integrating Auth0 in your application requires the auth0.js library. Install it using npm or yarn.

# installation with npm
npm install --save auth0-js

# installation with yarn
yarn add auth0-js

Once auth0.js is installed, add it to your build system or bring it in to your project with a script tag.

<script type="text/javascript" src="node_modules/auth0-js/build/auth0.js"></script>

If you don't want to use a package manager, auth0.js can also be retrieved from Auth0's CDN.

<script src="https://cdn.auth0.com/js/auth0/8.8/auth0.min.js"></script>

Add Authentication with Auth0

The first step in adding authentication to your jQuery application is to provide a way for your users to log in. The fastest, most secure, and most feature-rich way to do this with Auth0 is to use the hosted login page.

When authentication is successful, three items will be returned which can all be used at some point in your application: an access_token, an id_token, and the number of seconds until the access_token expires.

Create an Authentication Service

Add a new file called app.js. In this file you can create and manage an instance of auth0.WebAuth and also hold logic to hide and display DOM elements.

// app.js

$('document').ready(function() {

  var webAuth = new auth0.WebAuth({
    domain: AUTH0_DOMAIN,
    clientID: AUTH0_CLIENT_ID,
    redirectUri: AUTH0_CALLBACK_URL,
    audience: 'https://' + AUTH0_DOMAIN + '/userinfo',
    responseType: 'token id_token',
    scope: 'openid'

  var loginBtn = $('#btn-login');

  loginBtn.click(function(e) {


Checkpoint: Try adding a button with a class of btn-login to your app. This will call the authorize method from auth0.js so you can see the login page.

hosted login

Finish Out the Authentication Functions

Add some additional functions to app.js to fully handle authentication in the app.

// app.js

$('document').ready(function() {

  // ...
  var loginStatus = $('.container h4');
  var loginView = $('#login-view');
  var homeView = $('#home-view');

  // buttons and event listeners
  var homeViewBtn = $('#btn-home-view');
  var loginBtn = $('#btn-login');
  var logoutBtn = $('#btn-logout');

  homeViewBtn.click(function() {
    homeView.css('display', 'inline-block');
    loginView.css('display', 'none');

  loginBtn.click(function(e) {


  function setSession(authResult) {
    // Set the time that the access token will expire at
    var expiresAt = JSON.stringify(
      authResult.expiresIn * 1000 + new Date().getTime()
    localStorage.setItem('access_token', authResult.accessToken);
    localStorage.setItem('id_token', authResult.idToken);
    localStorage.setItem('expires_at', expiresAt);

  function logout() {
    // Remove tokens and expiry time from localStorage

  function isAuthenticated() {
    // Check whether the current time is past the
    // access token's expiry time
    var expiresAt = JSON.parse(localStorage.getItem('expires_at'));
    return new Date().getTime() < expiresAt;

  function handleAuthentication() {
    webAuth.parseHash(function(err, authResult) {
      if (authResult && authResult.accessToken && authResult.idToken) {
        window.location.hash = '';
        loginBtn.css('display', 'none');
        homeView.css('display', 'inline-block');
      } else if (err) {
        homeView.css('display', 'inline-block');
          'Error: ' + err.error + '. Check the console for further details.'

  function displayButtons() {
    if (isAuthenticated()) {
      loginBtn.css('display', 'none');
      logoutBtn.css('display', 'inline-block');
      loginStatus.text('You are logged in!');
    } else {
      loginBtn.css('display', 'inline-block');
      logoutBtn.css('display', 'none');
      loginStatus.text('You are not logged in! Please log in to continue.');


The file now includes several other functions for handling authentication.

  • handleAuthentication - looks for an authentication result in the URL hash and processes it with the parseHash method from auth0.js
  • setSession - sets the user's access_token, id_token, and a time at which the access_token will expire
  • logout - removes the user's tokens from browser storage
  • isAuthenticated - checks whether the expiry time for the access_token has passed

About the Authentication Functions

The first noteworthy thing happening here is that an instance of auth0.WebAuth is created. The options object passed to it includes configuration for your client and domain, a response type to indicate you would like to receive an access_token and id_token after authentication, and an audience and scope which specify that authentication should be OIDC conformant. Also specified is the location that users should be returned to after authentication is complete. In this case, that's the main URL for the application.

When a user successfully authenticates at Auth0's hosted login page and is redirected back to your application, there will be a hash fragment in the URL containing their authentication information. Contained within will be an access_token, an id_token and an expires_in value. These values are extracted from the URL using the parseHash method from auth0.js and are then saved into local storage with the setSession method. This method also calculates the time at which the access_token will expire using the expires_in value from the hash.

Authentication using JSON Web Tokens is stateless by nature, meaning that there is no information about the user's session stored on your server. In this way, setting up a session for the user on the client side is simply a matter of saving the access_token, id_token, and a time that the access_token expires at in browser storage. Conversely, logging the user out only requires that these items be removed from storage. These examples use local storage to save the tokens and the expiry time, but you may also use session storage or cookies if you wish.

The application needs some way to make decisions about showing or hiding UI elements and restricting routing based on whether or not the user can be considered "authenticated". Once again, since JWT authentication is stateless, there is no real way to say whether the user is authenticated in any traditional sense, but there are clues that can be used. The best clue to go with is whether or not the access_token is expired. If it is expired, anything meaningful that the user could do with it--such as a call to your API for protected resources--will not work. It's at this point that the user would need to reauthenticate and get a new token. The isAuthenticated method checks whether the expiry time for the access_token has passed or not so that the above-mentioned decisions can be made.

Provide a Login Control

Provide a template with controls for the user to log in and log out.

<!-- index.html -->

<div class="content">
  <nav class="navbar navbar-default">
    <div class="container-fluid">
      <div class="navbar-header">
        <a class="navbar-brand" href="#">Auth0 - jQuery</a>

        <button id="btn-home-view" class="btn btn-primary btn-margin">

        <button id="btn-login" class="btn btn-primary btn-margin">
            Log In

        <button id="btn-logout" class="btn btn-primary btn-margin">
            Log Out


  <main class="container">
    <!-- home view -->
    <div id="home-view">


This example uses Bootstrap styles, but that's unimportant. Use whichever style library you like, or don't use one at all.

The click event listeners added to the Log In and Log Out buttons make the appropriate calls to the functions in app.js to allow the user to log in and log out. Notice that these buttons are conditionally hidden and shown depending on whether or not the user is currently authenticated.

When the Log In button is clicked, the user will be redirected to Auth0's hosted login page.

The hosted login page uses the Lock widget and is configured in the Hosted Pages section in your Auth0 dashboard. To customize the look and feel of the Lock widget, see the configuration options documentation.

Process the Authentication Result

When a user authenticates at Auth0's hosted login page and is then redirected back to your application, their authentication information will be contained in a URL hash fragment. The handleAuthentication function in app.js is responsbile for processing the hash.

Call handleAuthentication in app.js so that the authentication hash fragment can be processed when the app first loads after the user is redirected back to it.

// app.js

$('document').ready(function() {

  // ...

Embedded Login

Auth0's hosted login page provides the fastest, most secure, and most feature-rich way to implement authentication in your app. If required, the Lock widget can also be embedded directly into your application, but certain features such as single sign-on won't be accessible. It is highly recommended that you use the hosted login page (as covered in this tutorial), but if you wish to embed the Lock widget directly in your application, follow the Embedded Login sample.

Next Tutorial
2. User Profile
Use Auth0 for FREECreate free Account