Authentication
Securing access to your Refgrow instance and affiliate dashboard
Overview
Refgrow provides multiple authentication options to meet your security requirements and integrate with your existing user systems. This guide explains how to implement authentication for both program administrators and affiliates.
Administrator Authentication
Standard Email/Password Login
Refgrow offers a built-in authentication system for program administrators:
- Email and password credentials
- Two-factor authentication (2FA) for enhanced security
- Password reset functionality
This is the default authentication method used when you create your Refgrow account.
Social Authentication
Connect your Refgrow administrator account with popular OAuth providers:
- GitHub
To enable social authentication:
- Go to your account settings
- Navigate to the "Authentication" tab
- Select the social providers you want to enable
- Follow the prompts to connect your accounts
Two-Factor Authentication (2FA)
Enable 2FA for an extra layer of security on your Refgrow administrator account:
- Go to your account settings
- Navigate to the "Security" tab
- Click "Enable 2FA"
- Scan the QR code with an authenticator app like Google Authenticator or Authy
- Enter the verification code to confirm setup
- Save your backup codes in a secure location
Once enabled, you'll need to enter both your password and a time-based one-time password (TOTP) from your authenticator app when logging in.
Affiliate Authentication
Standalone Authentication
If you're using Refgrow's standalone affiliate dashboard, affiliates can use:
- Email and password registration
- Magic link authentication (passwordless login via email)
This is ideal for programs where affiliates don't have accounts in your main application or when you're using Refgrow as a separate affiliate system.
Integrating with Your Existing User System
If you already have users in your application, you can integrate Refgrow with your existing authentication:
JWT Authentication
Pass a JSON Web Token (JWT) when embedding the Refgrow affiliate dashboard:
<div
id="refgrow-affiliate-dashboard"
data-program-id="YOUR_PROGRAM_ID"
data-program-email="user@example.com"
data-auth-token="eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9..."
></div>
<script src="https://cdn.refgrow.com/js/affiliate-dashboard.js"></script>
The JWT should include:
email
: The affiliate's email addressname
: The affiliate's display nameexp
: Expiration timestamp
Sign the JWT with your Refgrow API secret from your program settings.
Setting Up a Custom Authentication Endpoint
For advanced integration, you can set up a custom authentication endpoint:
- Create an API endpoint in your application that validates user credentials
- Configure this endpoint in your Refgrow program settings under "Authentication"
- Refgrow will call this endpoint when affiliates attempt to log in
Your endpoint should:
- Accept POST requests with username/password or token
- Return a JSON response with authentication status and user details
- Include proper CORS headers if your application and Refgrow are on different domains
Example Endpoint Response:
{
"success": true,
"user": {
"email": "affiliate@example.com",
"name": "John Doe",
"id": "user_12345",
"customData": {
"accountType": "premium",
"joinedDate": "2023-01-15"
}
}
}
Security Best Practices
Encourage administrators and affiliates to use strong, unique passwords with a combination of uppercase and lowercase letters, numbers, and special characters.
Enable two-factor authentication for all administrator accounts and consider making it mandatory for enhanced security.
Regularly rotate your API keys and authentication tokens, especially if you suspect a security breach.
When using JWTs, set reasonable expiration times to limit the window of opportunity if a token is compromised.
Troubleshooting
If affiliates can't log in with JWT authentication:
- Verify your JWT is properly signed with the correct secret key
- Ensure the JWT hasn't expired
- Check that all required claims (email, name, exp) are included
- Verify the email in the JWT matches the email in data-program-email
If your custom authentication endpoint isn't working:
- Check your server logs for detailed error information
- Verify CORS headers are properly set if needed
- Ensure your endpoint returns the expected JSON structure
- Test the endpoint directly with a tool like Postman
If you're having trouble with two-factor authentication:
- Ensure your device's time is correctly synchronized
- Try using your backup codes if you can't access your authenticator app
- Contact support if you've lost access to both your authenticator app and backup codes
Next Steps
- Learn about security best practices for your Refgrow installation
- Explore dashboard customization options
- Set up conversion tracking for your affiliates