Identity Linking
Manage the identities associated with your user
The user identity
The user identity represents an authentication method associated to the user. For example, if a user signs in using their email, an email identity will be associated with the user.
The user identity object contains the following attributes:
Attributes | Type | Description |
---|---|---|
id | string | The provider id returned by the provider. If the provider is an OAuth provider, the id refers to the user's account with the OAuth provider. If the provider is email or phone , the id is the user's id from the auth.users table. |
user_id | string | The user's id that the identity is linked to. |
identity_data | object | The identity metadata. |
identity_id | string | The unique id of the identity. |
provider | string | The provider name. |
created_at | string | The timestamp that the identity was created. |
last_sign_in_at | string | The timestamp that the identity was last used to sign in. |
updated_at | string | The timestamp that the identity was last updated. |
Identity linking strategies
Currently, Supabase Auth supports 2 strategies to link an identity to a user:
Automatic linking
Supabase Auth automatically links identities with the same email address to a single user. This helps to improve the user experience when multiple OAuth login options are presented since the user does not need to remember which OAuth account they used to sign up with. When a new user signs in with OAuth, Supabase Auth will attempt to look for an existing user that uses the same email address. If a match is found, the new identity is linked to the user.
In order for automatic linking to correctly identify the user for linking, Supabase Auth needs to ensure that all user emails are unique. It would also be an insecure practice to automatically link an identity to a user with an unverified email address since that could lead to pre-account takeover attacks. To prevent this from happening, when a new identity can be linked to an existing user, Supabase Auth will remove any other unconfirmed identities linked to an existing user.
Users that signed up with SAML SSO will not be considered as targets for automatic linking.
Manual linking (beta)
In the example above, the user will be redirected to Google to complete the OAuth2.0 flow. Once the OAuth2.0 flow has completed successfully, the user will be redirected back to the application and the Google identity will be linked to the user. You can enable manual linking from your project's authentication configuration options or by setting the environment variable GOTRUE_SECURITY_MANUAL_LINKING_ENABLED: true
when self-hosting.