A secure and high-performance starting point for building B2B SaaS web applications.
Ready to begin? Jump ahead to the Getting Started section.
This sample application provides developers with a solid foundation to kickstart their journey into building a business-to-business software-as-a-service (B2B SaaS) application. With a carefully selected stack of well-documented and widely adopted technologies, along with seamless integration with Auth0 for identity and login management, this starter kit aims to streamline the development process, enabling you to focus on building out your core product instead of worrying about the complexities of SaaS identity management and secure customer onboarding.
It incorporates best practices and industry-standard technologies to provide a robust and scalable solution for building secure software, with all the capabilities you need to be competitive, resilient, and scalable. The project includes the architecture and components you need to get started, authentication and authorization powered by Auth0, and deployment instructions that make it easy to move to staging or production when you're ready.
Use this to bootstrap a SaaS application with the following commonly needed capabilities:
- Multi-tenancy with a single pool of users in a shared user database (see: Multiple Organization Architecture)
- Sign up with tenant (Organization) creation
- Logged in / Logged out product landing page experience
- User management with invitation workflows, create/delete user capabilities, and RBAC roles
- Self-service user profile management, password reset, and MFA configuration
- Self-service Enterprise Single Sign-On (SSO) configuration using
- OIDC
- SAML
- Ability for end-users to verify domain ownership before associating their email domains with home realm discovery
- Just-in-time user provisioning OR automatic directory sync with SCIM (coming soon)
- API client management with self-service create/delete capabilities (coming soon)
- Configurable security policies:
- Enforce MFA
- Session lifetime (coming soon)
- Break-glass access for admin roles (coming soon)
- Node.js v20 or later is required to run the bootstrapping process. We recommend using
nvm
to manage node versions in your development environment. - You must have
npm
or a comparable package manager installed in your development environment. These instructions assume that you're usingnpm
. - Create a new Auth0 tenant which will be configured automatically by our bootstrapping command. You can sign up for a free Auth0 account at https://auth0.com/signup. See Create Tenants in the Auth0 docs if you need help.
Important
Creating a new tenant before you continue is highly recommended so that you don't accidentally change the configuration in any existing Auth0 projects you might have.
-
Clone this repo to your development environment. Navigate to a directory where you want to work in a terminal program, and run the following command:
git clone https://github.com/auth0-developer-hub/auth0-b2b-saas-starter.git
-
Navigate into the directory by typing the following command:
cd auth0-b2b-saas-starter
-
Install dependencies for the project using your favorite package manager. For example, if you're using npm, type:
npm install
This project uses the Auth0 CLI to make setting up your tenant a lot easier, by scripting away as much manual work as possible. If you want to familiarize yourself with the Auth0 CLI, read Auth0 CLI Basics.
-
You will need to install the Auth0 CLI. It will be used by the bootstrap script to create the resources needed for this sample in your Auth0 tenant. Instructions for installation are available at the Auth0 CLI github repo.
For example, users on OSX using Homebrew can run the following command to install the CLI:
brew tap auth0/auth0-cli && brew install auth0
You can confirm whether or not the CLI is correctly installed by running the following command:
auth0 --version
A successful installation will result in a response with the CLI version number printed out, like this:
auth0 version 1.4.0 54e9a30eeb58a4a7e40e04dc19af6869036bfb32
-
Log in by entering the following command and following the instructions to choose a specific tenant to authenticate with:
auth0 login --scopes "update:tenant_settings,create:connections,create:client_grants,create:email_templates,update:guardian_factors"
Be sure to select
As a user
when prompted:How would you like to authenticate?
. This will take you through a flow that will securely retrieve a Management API token for your Auth0 tenant.Warning
At the Authorize App step, be sure to select the correct tenant. This is the tenant that will be bootstrapped in the next steps.
This step will create and update entities in your Auth0 tenant. The provided script will use the Auth0 CLI to provision the resources required for this sample application:
- Creating the appropriate clients (called Applications in Auth0)
- Creating admin and member roles,
- Creating actions for setting roles and security policies
- Creating email and login templates
- Enabling MFA factors
Finally, it will save environment variables for your tenant in the application directory.
Warning
Only run the following command on a newly created tenant to avoid changing existing configuration or introducing conflicting elements to your existing Auth0 tenants!
If you are creating a new Auth0 tenant at this point in the process, go back to step 2 in order to ensure you're logged into the correct Auth0 tenant.
Run the following command:
npm run auth0:bootstrap
Once the script has successfully completed, a .env.local
file containing the environment variables will be written to the root of your project directory.
-
Run the development server:
npm run dev
-
Open http://localhost:3000 with your browser to see the result.
Note: If you're running the application on a different port, adjust the provided localhost URL accordingly.
You can proceed to interact with the app as if you were a user: create an account, navigate to the settings, explore the identity capabilities.
-
Start editing to build your own SaaS application - for example, modify
app/page.tsx
. The browser will hot-reload to show changes as you edit the file.
To learn more about Auth0, take a look at the following resources:
- Understand how Auth0 Organizations Work - learn about how this project achieves multi-tenancy
- Customize - learn how to brand and internationalize all Auth0 interactions with your end-users
This template includes a set of security examples brought to you by Pangea. In order to make use of these services, you'll need to enable the services by following this guide to get started. You'll need to enable secure audit log, secure share, and redact.
You'll need to create a token as specified in the onboarding guide.
You can also setup auth0 log streaming to pangea's secure audit log service by following this guide or heading over to the auth0 marketplace.
You can setup the secure audit log component to use the pangea service activity audit log by getting the service config ID for it in the secure audit log settings page as shown below:
Now, you'll now need to enable Pangea's Vault Service if it's not already enabled, and create a token that only has access to vault. Make sure your service token (created previously) is stored in vault, move it to vault using the tokens edit page
and checking the Store Token In Vault
box. Get that token's vault identifier (prefixed pvi_
) from the Vault Secrets & Keys
section under the folder called Service Tokens
.
All you need to do is add the following environment variables to your app:
PANGEA_DOMAIN=<domain from your pangea account eg. aws.us.pangea.cloud>
PANGEA_TOKEN=<token with access to vault>
PANGEA_SERVICE_TOKEN_ID=<service token identifier prefixed pvi_>
NEXT_PUBLIC_PANGEA_AUDIT_AUTH0_CONFIG_ID=<audit config ID for audit log streaming>
NEXT_PUBLIC_PANGEA_AUDIT_SERVICES_CONFIG_ID=<audit config ID for service activity>
See CONTRIBUTING for information.
Questions? Feedback? Drop us a line in the Auth0 Community