Skip to main content
Version: 1.x

Traditional Web: Integrate with Logto


This tutorial assumes you have created an Application of type "Traditional Web" in Admin Console. If you are not ready, read this before continuing.

Your app may run on the server-side instead of the browser, using frameworks like Django, Express, Laravel, NextJS, etc. That is called a Traditional Web App. For now, you need to integrate Logto manually. This article guides you on how to finish it step by step. And we take Express in Node.js as an example.


This article is not just for Express, and if you are using other frameworks or even other languages, you can replace @logto/js with other language's core SDK and then adjust some of the steps.

Get source codeโ€‹

You can go to GitHub to get the final code for this tutorial.

Start an Express projectโ€‹

With express-generator, you can quickly start an Express project.

mkdir express-logto
cd express-logto
npx express-generator

Install dependenciesโ€‹

The demo app will need 4 dependencies:

  1. @logto/js: Logto's core SDK for JavaScript.
  2. node-fetch: Minimal code for a window.fetch compatible API on Node.js runtime.
  3. express-session: A session middleware, we'll use the session to store user tokens.
  4. js-base64: Yet another Base64 transcoder.
npm i @logto/js [email protected] express-session js-base64

Use sessionโ€‹

When users are signed in, they will get a set of tokens (Access Token, ID Token, Refresh Token) and interaction data, and the session is an excellent place to store them.

We have installed express-session in the previous step, so now let's simply add the following code to set it up:

// app.js

const session = require('express-session');

secret: 'keyboard cat', // Change to your own secret key
cookie: { maxAge: 86400 },

Implement functions to authenticate usersโ€‹


We assume the application is running on http://localhost:3000 in the following code snippets.

In this step, we need to implement the following authenticate functions:

  1. getSignInUrl: builds and returns a complete URL of the Logto Authorization Server to which users will be redirected.
  2. handleSignIn: parses the callback URL after the authentication process completes, gets the code query parameter, and then fetches tokens (an access token, the refresh token, and an ID token) to complete the sign in process.
  3. refreshTokens: exchanges a new access token using the refresh token.

You can find and copy "App Secret" from application details page in Admin Console:

App Secret
// logto.js

const {
} = require('@logto/js');
const fetch = require('node-fetch');
const { randomFillSync, createHash } = require('crypto');
const { fromUint8Array } = require('js-base64');

const config = {
endpoint: '',
appId: 'foo',
appSecret: '<your-app-secret-copied-from-console>',
redirectUri: 'http://localhost:3000/callback', // You may need to replace it with your app's production address
scopes: withReservedScopes().split(' '),

const requester = (input, init) => {
const { appId, appSecret } = config;

return fetch(input, {
headers: {
authorization: `Basic ${Buffer.from(`${appId}:${appSecret}`, 'utf8').toString('base64')}`,

const generateRandomString = (length = 64) => {
return fromUint8Array(randomFillSync(new Uint8Array(length)), true);

const generateCodeChallenge = async (codeVerifier) => {
const encodedCodeVerifier = new TextEncoder().encode(codeVerifier);
const hash = createHash('sha256');
const codeChallenge = hash.digest();
return fromUint8Array(codeChallenge, true);

const getOidcConfig = async () => {
return fetchOidcConfig(new URL(discoveryPath, config.endpoint).toString(), requester);

exports.getSignInUrl = async () => {
const { authorizationEndpoint } = await getOidcConfig();
const codeVerifier = generateRandomString();
const codeChallenge = await generateCodeChallenge(codeVerifier);
const state = generateRandomString();

const { redirectUri, scopes, appId: clientId } = config;

const signInUri = generateSignInUri({
redirectUri: redirectUri,

return { redirectUri, codeVerifier, state, signInUri };

exports.handleSignIn = async (signInSession, callbackUri) => {
const { redirectUri, state, codeVerifier } = signInSession;
const code = verifyAndParseCodeFromCallbackUri(callbackUri, redirectUri, state);

const { appId: clientId } = config;
const { tokenEndpoint } = await getOidcConfig();
const codeTokenResponse = await fetchTokenByAuthorizationCode(

return codeTokenResponse;

exports.refreshTokens = async (refreshToken) => {
const { appId: clientId, scopes } = config;
const { tokenEndpoint } = await getOidcConfig();
const tokenResponse = await fetchTokenByRefreshToken(

return tokenResponse;

Sign inโ€‹

The sign-in flow can be simplified as:

Web sign-in flow

Configure Redirect URIโ€‹

Let's switch to the Application details page of Admin Console in this section. Add a Redirect URI http://localhost:3000/callback and click "Save Changes".

Redirect URI in Admin Console

Redirect URI is an OAuth 2.0 concept which implies the location should redirect after authentication.

Implement sign in routeโ€‹


Before calling getSignInUrl(), make sure you have correctly configured Redirect URI in Admin Console.

Create a route in Express to sign in:

const { getSignInUrl } = require('./logto');

app.get('/sign-in', async (req, res) => {
const { redirectUri, codeVerifier, state, signInUri } = await getSignInUrl();
req.session.signIn = { codeVerifier, state, redirectUri };

and a route to handle callback:

app.get('/callback', async (req, res) => {
if (!req.session.signIn) {
res.send('Bad request.');

const response = await handleSignIn(
req.session.tokens = {
expiresAt: response.expiresIn +,
idToken: decodeIdToken(response.idToken),
req.session.signIn = null;


Sign outโ€‹

TODO: link to the "session & cookies" chapter in users reference.

You can clear tokens in session to sign out a user from this application. And check this link to read more about "sign out".

app.get('/sign-out', (req, res) => {
req.session.tokens = null;
res.send('Sign out successful');

Access protected resourceโ€‹

Create a middleware named withAuth to attach an auth object to req, and verify if a user is signed in.

// auth.js

const { decodeIdToken } = require('@logto/js');
const { refreshTokens } = require('./logto');

const withAuth =
({ requireAuth } = { requireAuth: true }) =>
async (req, res, next) => {
if (requireAuth && !req.session.tokens) {

if (req.session.tokens) {
if (req.session.tokens.expiresAt >= {
// Access token expired, refresh for new tokens
try {
const response = await refreshTokens(req.session.tokens.refreshToken);
req.session.tokens = {
expiresAt: response.expiresIn +,
idToken: decodeIdToken(response.idToken),
} catch {
// Exchange failed, redirect to sign in

req.auth = req.session.tokens.idToken.sub;


module.exports = withAuth;

create index page, show a sign-in link for guests, and a go-to-profile link for users that already signed in:

router.get('/', withAuth({ requireAuth: false }), function (req, res, next) {
res.render('index', { auth: Boolean(req.auth) });
extends layout

block content
h1 Hello logto
if auth
p: a(href="/user") Go to profile
p: a(href="/sign-in") Click here to sign in

create user page, to display userId (subject):

app.get('/user', withAuth(), (req, res, next) => {
res.render('user', { userId: req.auth });
extends layout

block content
h1 Hello logto
p userId: #{userId}

Further readingsโ€‹