Widget Integration
Configuration Options
The widget supports these configuration attributes:Required Attributes
data-public-key: Your PUBLIC keyaction: Authentication action (signin,signup,reset,update,verify,resend)defer: For proper script loading
Optional Attributes
theme:"light"(default) or"dark"disable-styles:"true"or"false"(default)termsAndConditions: URL for terms and conditions pageprivacy: URL for privacy policynotificationSettings: URL for notification settingsbuttonName: Custom text for submit buttondata-messages: JSON string containing custom success and loading messagessuccessAuthPath: Custom URL to redirect after successful sign insigninAuthPath: Custom URL to redirect after email verificationverifyAuthPath: Custom URL for email verification pageupdatePasswordPath: Custom URL for password update pageresendAuthPath: Custom URL for resend verification pageresetAuthPath: Custom URL for password reset pagedata-customization: JSON string containing layout and styling customizationsaction: Authentication action (optional if URL contains action)
URL-Based Action Detection
The widget can automatically detect the authentication action from the URL if noaction attribute is provided in the script tag. It will scan the URL for any of the valid actions (signin, signup, verify, reset, update, resend).
- If the URL is
https://example.com/auth/signup, the widget will show the signup form - If the URL is
https://example.com/verify?token=abc123, the widget will show the verification form - If the URL is
https://example.com/auth#reset, the widget will show the password reset form
If both the URL contains an action and the script tag has an
action attribute, the attribute in the script tag takes precedence.Direct CSS Styling
In addition to using thedata-customization attribute, you can directly style the widget elements using CSS selectors. The widget uses specific class names that you can target in your stylesheets:
CSS Class Reference
The widget uses the following CSS classes that you can target for custom styling:| CSS Class | Element | Description |
|---|---|---|
.authiqa-container | Main container | The outer container of the widget |
.authiqa-title | Title | The main heading (h1) of the form |
.authiqa-input | Input fields | All input fields (email, password, etc.) |
.authiqa-button | Submit button | The main action button |
.authiqa-password-container | Password field wrapper | Container for password input and toggle |
.password-toggle | Password visibility toggle | Button to show/hide password |
.authiqa-error | Error message | Container for error messages |
.authiqa-success | Success message | Container for success messages |
.authiqa-form | Form element | The form element containing inputs |
.authiqa-label | Input labels | Labels above input fields |
.authiqa-labeled-input | Label+input container | Container for label and input pairs |
.terms-container | Terms checkbox area | Container for terms and conditions checkbox and text |
When styling the widget with CSS, use the
!important flag to ensure your styles override the default styles. For more complex customizations, you can use the disable-styles="true" attribute and apply your own styles from scratch.Combined Example with Custom CSS and URL-Based Action
This example shows how to combine custom CSS styling with URL-based action detection:Advanced Customization
The widget supports extensive customization through thedata-customization attribute:
Page and Form Layout
Colors and Typography
Input Fields and Buttons
Each authentication action (signin, signup, reset, update, verify, resend) has corresponding customizable text for both its title and button. This allows for complete white-labeling of all authentication forms.All labels are properly associated with their input fields using the
for attribute for improved accessibility. This allows users to click on labels to focus the corresponding input field and improves screen reader compatibility.Input Field Customization Options
The widget now supports extensive customization of input fields through thecustomization.inputs object:
| Property | Type | Description | Example |
|---|---|---|---|
emailPlaceholder | string | Placeholder text for email input | ”Your work email” |
passwordPlaceholder | string | Placeholder text for password input | ”Create a strong password” |
usernamePlaceholder | string | Placeholder text for username input | ”Choose a username” |
confirmPasswordPlaceholder | string | Placeholder text for confirm password input | ”Re-enter your password” |
emailLabel | string | Label text for email input | ”Email Address” |
passwordLabel | string | Label text for password input | ”Password” |
usernameLabel | string | Label text for username input | ”Username” |
confirmPasswordLabel | string | Label text for confirm password input | ”Confirm Password” |
height | string | Height of input fields | ”48px” |
width | string | Width of input fields | ”100%“ |
padding | string | Padding inside input fields | ”12px 16px” |
margin | string | Margin around input fields | ”8px 0” |
fontSize | string | Font size of input text | ”16px” |
fontWeight | string | Font weight of input text | ”400” |
borderRadius | string | Border radius of input fields | ”8px” |
focusBorderColor | string | Border color when input is focused | ”#10D5C6” |
focusBoxShadow | string | Box shadow when input is focused | ”0 0 0 2px rgba(16, 213, 198, 0.25)“ |
placeholderAlign | string | Text alignment for placeholder text | ”left”, “center”, “right” |
Complete Customization Example
Labels follow accessibility best practices by being properly associated with their input fields using the
for attribute. This improves usability for screen readers and allows users to click on the label to focus the input field.General OAuth Configuration (All Providers)
Follow these steps to configure OAuth correctly across providers:- Create an app in your provider’s developer portal and enable Web OAuth 2.0.
- Configure Redirect URIs exactly as used by your widget page(s):
- X (Twitter): The widget may use
signinAuthPath/signupAuthPathif provided; otherwise it uses the current page URL (origin + pathname). Add each exact URL to your X app’s Redirect URLs. - Facebook: The widget always uses the current page URL (
origin + pathname). Add each exact URL to “Valid OAuth Redirect URIs”. - Google: See the Google SSO section below for required JavaScript origins and redirect URIs.
- X (Twitter): The widget may use
- Use least-privilege permissions/scopes:
- X (Twitter): Select “Read” only. Scopes used by the widget are
tweet.readandusers.read. Disable the “Request email address from users” option. - Facebook: Ensure the
emailpermission is enabled (the widget requests it).
- X (Twitter): Select “Read” only. Scopes used by the widget are
- Configure your Authiqa organization to enable providers and set client IDs (and secrets if required by your backend). Only client IDs are used client-side; secrets remain on the server.
- Test environments:
- Include localhost URLs (e.g.,
http://localhost:3000) in each provider configuration when developing locally. - Ensure the exact path you mount the widget on is included (e.g.,
/auth,/signin).
- Include localhost URLs (e.g.,
- SPA and state handling:
- The widget uses
sessionStoragefor OAuth state/PKCE. Do not clear it between redirect and callback. - Keep the same
origin + pathnameacross the redirect flow to avoid redirect URI mismatches.
- The widget uses
- Post-auth redirect:
- Use
successAuthPathto control the final redirect after successful authentication. - If you use
signinAuthPath/signupAuthPathfor X, add those full URLs to the provider’s allowed redirect list.
- Use
Google SSO Integration
The Authiqa widget includes built-in support for Google Single Sign-On (SSO) authentication. When Google SSO is enabled for your organization, the widget automatically displays Google authentication options without requiring additional configuration.Quick Setup Checklist
Before diving into the detailed setup, here’s a quick checklist of what you need:- Google Cloud Console account
- Google OAuth 2.0 Client ID and Secret
- Authorized JavaScript Origins configured
- Authorized Redirect URIs configured (including Authiqa callback)
- Google+ API enabled
- OAuth Consent Screen configured
- Authiqa organization updated with Google credentials
Google SSO Features
Google Sign-In Button
- Automatically appears below the main submit button on Sign In and Sign Up forms
- Only displayed when Google SSO is enabled for your organization
- Styled to match your widget’s theme and customization
- Handles both sign-in and sign-up flows seamlessly
Google One Tap
- Displays Google’s One Tap prompt for streamlined authentication
- Appears after the Google button is rendered (with a short delay)
- Only shown once per session to avoid repetitive prompts
- Provides the fastest authentication experience for returning users
How Google SSO Works
- Automatic Detection: The widget checks if Google SSO is enabled for your organization
- Dynamic Rendering: If enabled, a Google Sign-In/Sign-Up button appears below the main form
- One Tap Integration: Google One Tap prompt may appear for eligible users
- Error Handling: Clear error messages are displayed if Google authentication fails
- Token Management: Successful Google authentication follows the same token storage as regular authentication
Google SSO Setup Guide
To enable Google SSO for your Authiqa widget, you need to configure Google OAuth credentials and update your organization settings. Follow this step-by-step guide:Step 1: Create Google OAuth Credentials
-
Go to Google Cloud Console
- Visit Google Cloud Console
- Sign in with your Google account
-
Create or Select a Project
- If you don’t have a project, click “Create Project”
- Give your project a name (e.g., “My App Authentication”)
- Click “Create”
-
Enable Google+ API
- In the left sidebar, go to “APIs & Services” > “Library”
- Search for “Google+ API”
- Click on it and press “Enable”
-
Configure OAuth Consent Screen
- Go to “APIs & Services” > “OAuth consent screen”
- Choose “External” for user type (unless you’re using Google Workspace)
- Fill in the required information:
- App name: Your application name
- User support email: Your support email
- Developer contact information: Your email
- Add your domain to “Authorized domains” (e.g.,
yourdomain.com) - Save and continue through the remaining steps
-
Create OAuth 2.0 Credentials
- Go to “APIs & Services” > “Credentials”
- Click “Create Credentials” > “OAuth 2.0 Client IDs”
- Choose “Web application” as the application type
- Give it a name (e.g., “Authiqa Widget”)
Step 2: Configure Authorized URLs
In the OAuth 2.0 client configuration, you need to add your authorized URLs: Authorized JavaScript Origins:Replace
yourdomain.com with your actual domain. Include both www and non-www versions if you use both. Always include the Authiqa callback URL: https://api.authiqa.com/auth/google/callbackStep 3: Get Your Credentials
After creating the OAuth client:-
Copy the Client ID
- You’ll see a “Client ID” that looks like:
123456789-abcdefghijklmnop.apps.googleusercontent.com - Copy this value
- You’ll see a “Client ID” that looks like:
-
Copy the Client Secret
- You’ll also see a “Client secret”
- Copy this value as well
Step 4: Configure Authiqa Organization
Use the Authiqa API to configure Google SSO for your organization:Replace
{organization_id} with your actual organization ID, and use your API token. You can find these values in your Authiqa dashboard.Configuration Requirements
Once you’ve completed the setup above, no additional configuration is needed in the widget code. The Google SSO feature is automatically handled based on your organization’s backend settings. The widget will:- Automatically detect that Google SSO is enabled
- Display the Google Sign-In/Sign-Up button
- Handle the authentication flow seamlessly
Testing Your Google SSO Setup
Local Development Setup
For testing during development, add localhost URLs to your Google OAuth configuration: Authorized JavaScript Origins:Verification Steps
- Check Google Console: Ensure your OAuth client is properly configured
- Verify API Response: Use the Get Organization Details API to confirm Google SSO is enabled
- Test the Widget: Load your authentication page and verify the Google button appears
- Test Authentication: Try signing in with a Google account
Common Google SSO Issues
Google Button Not Appearing
Possible Causes:
- Google SSO not enabled in organization settings
- Invalid or missing Google Client ID
- Domain restrictions preventing widget load
- Verify organization configuration via API
- Check Google Client ID in organization settings
- Ensure domain is properly configured
Authentication Errors
Possible Causes:
- Incorrect redirect URIs in Google Console
- Missing Authiqa callback URL
- Domain mismatch between widget and Google config
- Add all required redirect URIs
- Include
https://api.authiqa.com/auth/google/callback - Verify domain consistency
Google SSO Example
Google One Tap Configuration
The widget includes advanced Google One Tap integration that can be controlled with theenable-google-one-tap attribute:
Google One Tap Behavior
Google One Tap provides a streamlined authentication experience for users already logged into their Google accounts. The widget implements several optimizations for One Tap:- Delayed Rendering: One Tap is shown with a short delay after the Google button to prevent UI interference
- Session Management: One Tap is only shown once per session to avoid repetitive prompts
- Form Switching: One Tap is automatically dismissed when switching between authentication forms
- Success Tracking: One Tap is not shown again after a successful authentication
- SPA Support: One Tap is properly managed in Single Page Applications to prevent persistence issues
Controlling Google One Tap
You can control Google One Tap behavior in several ways:- Enable/Disable: Set
enable-google-one-tap="false"to completely disable One Tap while still showing the Google Sign-In button - Reset on Sign Out: Call
widget.resetGoogleOneTap()when a user signs out to allow One Tap to appear again in the same session - Cleanup: Call
widget.cleanup()when removing the widget from the DOM to ensure One Tap is properly dismissed
Google One Tap vs. Google Sign-In Button
The widget provides two Google authentication methods:- Google Sign-In Button: Always appears when Google SSO is enabled for your organization
- Google One Tap: Appears as a popup prompt only when enabled and appropriate for the user’s context
Google One Tap is only shown on Sign In and Sign Up forms, not on other authentication forms like password reset or email verification.
Required Google Console Settings Summary
For quick reference, here are the essential settings needed in Google Cloud Console:| Setting | Value | Notes |
|---|---|---|
| API | Google+ API | Must be enabled |
| OAuth Consent Screen | Configured with your app details | Include your domain in authorized domains |
| Application Type | Web application | Required for web-based authentication |
| JavaScript Origins | Your domain(s) + localhost for testing | Include both www and non-www versions |
| Redirect URIs | Your domain(s) + Authiqa callback | Must include https://api.authiqa.com/auth/google/callback |
Google Authentication Flow
The Google SSO integration supports both authentication flows:- Sign In: Existing users can sign in with their Google account
- Sign Up: New users can create an account using their Google credentials
- Account Linking: Users can link their existing Authiqa account with Google
Error Handling
If Google authentication encounters an error, the widget displays clear error messages:- Network connectivity issues
- Invalid Google credentials
- Account linking conflicts
- Organization-specific restrictions
Google SSO Security Best Practices
Domain Security
Authorized Domains:
- Only add domains you control
- Use HTTPS in production
- Avoid wildcard domains
- Regularly review authorized domains
Credential Management
Client Secrets:
- Store client secrets securely
- Never expose secrets in frontend code
- Rotate credentials periodically
- Use environment variables for secrets
Environment-Specific Configuration
Production Environment
Development/Staging Environment
Important: Use separate Google OAuth clients for different environments (development, staging, production) to maintain security isolation and proper URL configuration.
Google SSO availability depends on your organization’s configuration. Contact your administrator if you expect to see Google authentication options but they don’t appear.
X (Twitter) SSO Integration
The Authiqa widget includes built-in support for X (Twitter) OAuth 2.0 with PKCE. When X SSO is enabled for your organization and a Client ID is configured, the widget automatically displays an “Continue with X” button on Sign In and Sign Up forms.Quick Setup Checklist
- X Developer Portal app (Project + App)
- OAuth 2.0 Client ID configured
- App permissions include:
tweet.read,users.read - Authorized Redirect URIs include your widget page URL(s)
- X SSO enabled for your organization in Authiqa
How X SSO Works
- Automatic Detection: The widget checks your org configuration and shows the X button when enabled with a client ID.
- PKCE Flow: The widget uses OAuth 2.0 Authorization Code with PKCE (S256). It generates a
code_verifierandcode_challengeclient-side. - State Management:
stateincludes the source (signinorsignup) and a random token. The random value is stored insessionStorageunderx_oauth_stateand verified on callback. - Redirect URI:
- Sign In: uses
signinAuthPath(if provided) or the current page URL (origin + pathname). - Sign Up: uses
signupAuthPath(if provided) or the current page URL. The exact redirect URI used is stored insessionStorageasx_redirect_uriand sent to the backend during code exchange.
- Sign In: uses
- Scopes: The widget requests
tweet.read users.read. - Callback Exchange: On return from X, the widget POSTs to your API at
/auth/xwithcode,parentPublicKey, and, if available,codeVerifierandredirectUri. - Success Handling: Tokens are stored, success messages shown, then redirect to
successAuthPathor the configured success URL.
X Configuration Notes
- Ensure your X app allows OAuth 2.0 with PKCE and that the scopes above are granted.
- Add every page URL where the widget is mounted to your X app’s Redirect URLs (e.g.,
https://yourdomain.com/auth,http://localhost:3000/auth). - If you configure
signinAuthPathorsignupAuthPath, include those full URLs in your X app Redirect URLs.
X Troubleshooting
- X button not visible: Confirm X SSO is enabled and a Client ID is configured for your org.
- Invalid redirect_uri: Make sure the exact URL (including path) used by the widget is in your X app Redirect URLs.
- PKCE/State errors: Avoid clearing sessionStorage between redirect and callback; the widget relies on
x_oauth_stateandx_code_verifier.
Facebook SSO Integration
The Authiqa widget includes built-in support for Facebook OAuth 2.0. When Facebook SSO is enabled for your organization and a Client ID (App ID) is configured, the widget automatically displays a “Continue with Facebook” button on Sign In and Sign Up forms.Quick Setup Checklist
- Facebook App (App ID created in Meta for Developers)
- OAuth redirect setup with the exact page URLs
- Permission
emailenabled - Facebook SSO enabled for your organization in Authiqa
How Facebook SSO Works
- Automatic Detection: The widget checks your org configuration and shows the Facebook button when enabled with an App ID.
- Authorization Flow: The widget initiates the OAuth 2.0 code flow with the
emailscope. - State Management:
stateincludes the source (signinorsignup) and a random token. The random value is stored insessionStorageunderfacebook_oauth_stateand verified on callback. - Redirect URI: The widget uses the current page URL (
origin + pathname) as the redirect URI.- Include every page URL where the widget is mounted in your Facebook app’s Valid OAuth Redirect URIs.
- Unlike X, Facebook flow does not use
signinAuthPath/signupAuthPathoverrides in the widget.
- Callback Exchange: On return from Facebook, the widget POSTs to your API at
/auth/facebookwithcodeandparentPublicKey. - Success Handling: Tokens are stored, success messages shown, then redirect to
successAuthPathor the configured success URL.
Facebook Configuration Notes
- In Meta for Developers > Your App > Facebook Login > Settings, add the exact URLs where the widget is mounted to “Valid OAuth Redirect URIs” (e.g.,
https://yourdomain.com/auth,http://localhost:3000/auth). - Ensure the
emailpermission is approved or available for your app mode.
Facebook Troubleshooting
- Facebook button not visible: Confirm Facebook SSO is enabled and an App ID is configured for your org.
- URL mismatch: The redirect URI must exactly match the current page URL; add each path where the widget runs.
- State errors: Avoid clearing sessionStorage between redirect and callback; the widget relies on
facebook_oauth_state.
Custom Messages
The widget supports customizable messages for success and loading states:Error messages are not customizable as they display original server responses with error codes for better debugging.
Message Behavior
Display Duration
- Success messages: 2 seconds
- Error messages: 5 seconds
- Loading messages: During processing
Message Types
- Success messages: Green with checkmark
- Loading messages: Below submit button
- Error messages: Red with error code
If no custom messages are provided, the widget will use default messages. You can customize either success or loading messages independently.
Authentication Paths
The widget supports custom redirection paths for different authentication flows. Some of these paths also affect the URLs included in automated emails:Sign In Flow
After successful sign in, redirects to:
- Custom
successAuthPathif provided - Default success page if not provided
Email Links
When provided, these paths are used in automated emails:
verifyAuthPath: Used in verification emails (signup and resend)updatePasswordPath: Used in password reset emails
Path Configuration Examples
The
verifyAuthPath and updatePasswordPath are particularly important as they determine the URLs in authentication emails:- Verification emails (signup & resend) will use
verifyAuthPath+ verification token - Password reset emails will use
updatePasswordPath+ reset token
Theme Examples
Event Handling
HTML Examples for Different Actions
React Package
For React applications, we provide a dedicated React wrapper package that simplifies integration and provides a more React-friendly API.Installation
index.html):
Basic Usage
Critical Vite Configuration
⚠️ Important: For Vite applications, include this specific configuration invite.config.js:
Props Reference
| Prop | Type | Required | Default | Description |
|---|---|---|---|---|
publicKey | string | Yes | - | Your Authiqa public key |
action | string | No | ”signin” | Authentication action (“signin”, “signup”, “reset”, “verify”, “update”, “resend”) |
theme | string | No | ”light” | Widget theme (“light”, “dark”) |
mode | string | No | ”popup” | Display mode (“popup”, “inline”) |
container | string | Yes | ”authiqa-react-container” | Container ID |
onSuccess | function | No | - | Callback when authentication succeeds |
onError | function | No | - | Callback when authentication fails |
customization | object | No | - | Custom styling options (colors, typography, layout) |
termsAndConditions | string | No | - | URL to terms and conditions |
privacy | string | No | - | URL to privacy policy |
notificationSettings | string | No | - | URL to notification settings |
verifyAuthPath | string | No | - | Path for email verification |
updatePasswordPath | string | No | - | Path for password update |
resendAuthPath | string | No | - | Path for resending verification |
successAuthPath | string | No | - | Path for success redirect |
signinAuthPath | string | No | - | Path for sign-in redirect |
Customization Options
Thecustomization prop accepts an object with the following structure:
Event Handling
Authentication Flow Examples
Sign In Example
Sign Up Example
Framework Integration Examples
Next.js Example
React Router Example
Google SSO in React
The React wrapper automatically supports Google SSO when it’s enabled for your organization. No additional configuration is needed:Troubleshooting
- Widget not loading: Ensure the script is included in your HTML and the container element exists
- Vite configuration issues: Make sure to use the exact configuration provided in the Vite Configuration section
- Event handlers not firing: Check that event names match expected values (
onSuccess,onError) - Styling conflicts: Use the
customizationprop to override default styles or apply CSS targeting the widget container - Google SSO not appearing: Verify that Google SSO is enabled for your organization in the Authiqa dashboard
Password Expiry Handling
The widget includes built-in support for password expiry management. By default, passwords expire after 90 days to maintain security best practices.Expired Passwords
When a password has expired (90+ days old):
- User is redirected to the password reset page
- A warning message is displayed
- User must update their password to continue
Expiring Soon
When a password will expire soon:
- Warning message shows days until expiry
- For urgent warnings (≤3 days), message displays for 3 seconds
- For less urgent warnings (4-14 days), user can proceed immediately
- Critical: 3 days or less (enforced delay before proceeding)
- Warning: 4-14 days (informational only)
- No warning: 15-89 days remaining
Password expiry is managed server-side. The widget simply responds to the expiry status returned by the authentication API. The 90-day expiry period starts from the date when the password was last changed.
Global Configuration
The Authiqa Widget supports a centralized configuration approach that allows you to define styling and messaging options once and apply them across all authentication forms on your website.How It Works
- Create a JavaScript file (e.g.,
global-config.js) with your customization settings - Include this file in your HTML pages before the Authiqa widget script
- The widget will automatically apply these settings to all forms
The global configuration file can have any name you choose - it doesn’t have to be named “global-config.js”. What matters is that it defines the
window.AuthiqaGlobalConfig object and is loaded before the widget script.Global Configuration Structure
The global configuration uses awindow.AuthiqaGlobalConfig object with two main sections:
customization: Contains all styling and layout optionsmessages: Contains custom success and loading messages
Available Global Customization Options
The global configuration supports all the same customization options available through thedata-customization attribute, including:
Layout and Colors
Typography and Buttons
Advanced CSS
Global Messages
The global configuration also supports custom messages for different authentication actions:Overriding Global Settings
You can override global settings on a per-page basis by providing customization attributes directly in the widget script tag:The global configuration is particularly useful for maintaining consistent branding across all authentication forms on your website. It reduces duplication and makes it easier to update the styling of all forms at once.
Complete Global Configuration Example
Here’s a complete example of a global configuration file:Hash-Based Navigation
The widget now supports hash-based navigation, allowing users to switch between different authentication forms by changing the URL hash.Navigation Priority
The hash navigation follows these priority rules:- If a URL hash is present (e.g.,
#signin), it will show the corresponding form - If no hash is present, it will use the
actionattribute from the script tag - If neither is available, it will default to the signin form
action attribute while still enabling hash-based navigation.
Supported Hash Values
The hash navigation script supports the following hash values:| Hash | Form Displayed |
|---|---|
#signin | Sign In form |
#signup | Sign Up form |
#verify | Email Verification form |
#reset | Password Reset form |
#update | Password Update form |
#resend | Resend Confirmation form |
How Hash Navigation Works
The hash navigation script automatically reads all configuration from the main widget script tag, including:data-public-key: Your public keytheme: Widget theme setting- All path attributes (verifyAuthPath, updatePasswordPath, etc.)
enable-google-one-tap: Google One Tap configuration
- Extracts the action from the URL hash (e.g.,
#signinbecomessignin) - Checks if it’s a valid authentication action
- Creates or retrieves the widget instance with all configuration from the script tag
- Shows the appropriate form based on the hash or falls back to the original action
Domain Validation
For security purposes, the widget includes domain validation that restricts where it can be used:- By default, the widget only works on domains configured in your organization settings
- For development and testing, domain restriction can be disabled through the API
- When domain restriction is enabled, the widget will show an unauthorized error if used on non-approved domains
How Domain Validation Works
When the widget initializes, it:- Fetches your organization details from the Authiqa API
- Checks if domain restriction is enabled (enabled by default)
- If enabled, compares the current domain with your organization’s authorized domains
- If the domain is not authorized, displays an “Unauthorized Domain” error message
- Your exact organization domain
- Any subdomain of your organization domain
- Authiqa domains (for testing in the Authiqa dashboard)
Configuring Domain Restriction
You can check and update domain restriction settings through the Organization API:The development mode attribute should only be used for local testing and should not be included in production code. For production environments, properly configure your organization’s authorized domains.

