Tokens
View SourceToken Lifetime
Since refresh tokens are not yet included in ash_authentication, you should set the token lifetime to a reasonably long time to ensure a good user experience. Alternatively, refresh tokens can be implemented on your own.
Requiring Token Storage
Using AshAuthentication.Dsl.authentication.tokens.require_token_presence_for_authentication? inverts the token validation behaviour from requiring that tokens are not revoked to requiring any token presented by a client to be present in the token resource to be considered valid.
Requires store_all_tokens? to be true.
store_all_tokens? instructs AshAuthentication to keep track of all tokens issued to any user. This is optional behaviour with ash_authentication in order to preserve as much performance as possible.
Sign in Tokens
Enabled with AshAuthentication.Strategy.Password.authentication.strategies.password.sign_in_tokens_enabled?
Sign in tokens can be generated on request by setting the :token_type context to :sign_in when calling the sign in action. You might do this when you need to generate a short lived token to be exchanged for a real token using the validate_sign_in_token route. This is used, for example, by ash_authentication_phoenix (since 1.7) to support signing in a liveview, and then redirecting with a valid token to a controller action, allowing the liveview to show invalid username/password errors.
Extra Claims
You can add custom claims to generated tokens using the extra_claims option. This is useful for including user-specific data like roles, permissions, or tenant information in your JWTs.
DSL Configuration
Configure default extra claims that are included in all tokens for a resource:
authentication do
tokens do
enabled? true
token_resource MyApp.Token
# Using a function (receives user and options)
extra_claims fn user, _opts ->
%{"role" => user.role, "tenant_id" => user.tenant_id}
end
# Or using a static map
extra_claims %{"app_version" => "1.0"}
end
endThe function receives the user record and options (containing tenant, etc.) and should return a map of claims to include in the token.
Action-Level Claims
You can also add claims on a per-action basis using AshAuthentication.add_token_claims/2. This function works with changesets, queries, and action inputs.
For create actions (like registration):
create :register_with_password do
# ... other configuration
change AshAuthentication.GenerateTokenChange
change fn changeset, _ctx ->
AshAuthentication.add_token_claims(changeset, %{"session_type" => "registration"})
end
endFor read actions (like sign-in):
MyApp.User
|> Ash.Query.for_read(:sign_in_with_password, %{email: email, password: password})
|> AshAuthentication.add_token_claims(%{"session_type" => "api"})
|> Ash.read_one!()Action-level claims are merged with DSL-configured claims, with action-level claims taking precedence in case of conflicts.
Accessing Extra Claims
When store_all_tokens? is enabled, extra claims are stored in the token resource's extra_data attribute. When a user authenticates via bearer token or session (with require_token_presence_for_authentication? enabled), the extra claims are restored and available in the user's metadata:
# In a controller or plug
user = conn.assigns.current_user
claims = user.__metadata__.token_claims
# => %{"role" => "admin", "tenant_id" => "abc123"}This allows you to access custom token data without needing to decode the JWT on every request.