Upgrading to version 5.0.0
Version 5.0.0 includes several breaking changes related to action types and the Google OAuth strategy. Most changes can be handled automatically using the upgrade task.
Dependencies
This version requires Assent ~> 0.3.0 (updated from ~> 0.2.9) and adds nimble_totp as a dependency for the new TOTP strategy. Run mix deps.get after updating your ash_authentication version.
Automated Upgrade
If you have Igniter installed, run:
mix igniter.upgrade ash_authentication 4.x.x 5.0.0
Replace 4.x.x with your current version. This will automatically:
- Convert token resource
revoked?actions from:readto:actiontype - Convert password reset and magic link request actions from
:readto:actiontype - Create
get_by_<identity_field>read actions where needed - Update
"google_hd"references to"hd"in your codebase - Add identity-keyed brute-force protection to password and magic link strategies, generating an
audit_logadd-on (and audit log resource) if one is not already present
Breaking Changes
1. Sender failures now propagate as errors
Previously, sender failures were silently ignored. Now, senders that return {:error, reason} will cause the authentication action to fail with an AshAuthentication.Errors.SenderFailed error.
What this affects:
- Password reset requests
- Magic link requests
- Confirmation emails
Action required: Review your sender implementations. If they can return {:error, reason}, ensure your application handles these failures appropriately. Senders returning :ok or {:ok, result} (common with mailer libraries) will continue to work unchanged.
Recommended approach: Consider using a durable background job library like Oban for sending authentication emails. This provides automatic retries, failure tracking, and prevents transient email delivery issues from blocking user authentication flows. Your sender can enqueue a job and return :ok immediately, while the actual email delivery happens asynchronously with built-in resilience.
defmodule MyApp.AuthEmailSender do
use AshAuthentication.Sender
def send(user_or_email, token, opts) do
%{user_or_email: user_or_email, token: token, opts: opts}
|> MyApp.Workers.AuthEmail.new()
|> Oban.insert()
:ok
end
end2. Request actions converted to generic actions
Password reset request (request_password_reset_with_password) and magic link request (request_magic_link) actions are now generated as :action type instead of :read.
Action required: If you have customised these actions as :read actions, the upgrader will convert them automatically. If you've made extensive customisations, review the converted code to ensure it still meets your requirements.
The new actions work with auto-generated get_by_<identity_field> read actions for user lookup.
3. Token revoked action converted to generic action
The revoked? action on token resources is now a generic action returning a boolean, rather than a read action returning a record.
Action required: If you have a custom revoked? read action on your token resource, the upgrader will convert it automatically.
4. Google strategy now uses OIDC
The Google OAuth strategy now uses OIDC (via Assent 0.3.0) instead of the legacy API. This changes two fields in the user_info map:
| Old | New |
|---|---|
user_info["google_hd"] | user_info["hd"] |
user_info["email_verified"] (string "true") | user_info["email_verified"] (boolean true) |
Action required:
- The upgrader will automatically rename
"google_hd"to"hd"in your code - You must manually update any checks for
email_verified:
# Before
user_info["email_verified"] == "true"
# After
user_info["email_verified"] == trueIgniter Task Changes
Phoenix-specific code moved to ash_authentication_phoenix
The igniter tasks for password, magic_link, TOTP, and confirmation strategies no longer generate Phoenix-specific code (Swoosh senders with verified routes, controller modifications). AA's tasks now generate only resource-level code with basic IO.puts senders.
If you use ash_authentication_phoenix, its new convention-named strategy tasks (ash_authentication_phoenix.add_strategy.password, etc.) handle the Phoenix integration automatically — upgrading senders to use Swoosh and verified routes, modifying the AuthController for TOTP 2FA, and inserting TOTP routes.
Action required: If you re-run the igniter installer, the Phoenix-specific sender code will now come from AAP's tasks. Existing senders in your project are not affected — the igniter uses on_exists: :warning for sender modules, so existing customisations are preserved.
New Features
TOTP Two-Factor Authentication
Version 5.0.0 adds a complete TOTP (Time-based One-Time Password) strategy for two-factor authentication. See the TOTP tutorial for setup instructions.
To add TOTP to an existing project with ash_authentication_phoenix:
mix ash_authentication_phoenix.add_strategy totp
This composes both the AA resource-level task and the AAP Phoenix integration task.
Extra JWT Claims
You can now add custom claims to JWT tokens using the extra_claims option in the tokens DSL section, or dynamically via AshAuthentication.add_token_claims/2. See the tokens guide for details.
Identity-keyed brute-force protection
The password and magic_link strategies now support a brute_force_strategy option that counts recent failures by identity (via the audit log add-on) and blocks further attempts when the configured threshold is reached. The upgrader enables this automatically by:
- Ensuring an
audit_logadd-on (and audit log resource) is present on each resource usingpasswordormagic_link. - Adding
brute_force_strategy {:audit_log, <name>}to each affected strategy block.
Defaults to a 5 minute window with 5 allowed failures; tune audit_log_window and audit_log_max_failures on each strategy if you need different thresholds.
Other Improvements
- Auto signout in AshAuthentication.Phoenix - Automatic sign-out is now supported in the Phoenix integration
- API key header prefix regex support - The
ApiKey.Plugnow accepts regex patterns for header prefix matching - Better error handling -
Jwt.token_for_user/2now returns{:error, AuthenticationFailed.t}on failure instead of raising
Upgrading to version 4.0.0
Version 4.0.0 of AshAuthentication adds support for Ash 3.0 and in line with a number of changes in Ash there are some corresponding changes to Ash Authentication:
Token generation is enabled by default, meaning that you will have to explicitly set
authentication.tokens.enabled?tofalseif you don't need them.Sign in tokens are enabled by default in the password strategy. What this means is that instead of returning a regular user token on sign-in in the user's metadata, we generate a short-lived token which can be used to actually sign the user in. This is specifically to allow live-view based sign-in UIs to display an authentication error without requiring a page-load.
Upgrading to version 3.6.0.
As of version 3.6.0 the TokenResource extension adds the subject attribute
which allows us to more easily match tokens to specific users. This unlocks
some new use-cases (eg sign out everywhere).
This means that you will need to generate new migrations and migrate your database.
Upgrade steps:
Warning
If you already have tokens stored in your database then the migration will
likely throw a migration error due to the new NOT NULL constraint on
subject. If this happens then you can either delete all your tokens or
explicitly add the subject attribute to your resource with allow_nil? set
to true. eg:
attributes do
attribute :subject, :string, allow_nil?: true
end- Run
mix ash_postgres.generate_migrations --name=add_subject_to_token_resource - Run
mix ash_postgres.migrate - 🎉