Authentication

To use Smart Auth Authentications API, you will need to generate Smart Auth access token. This page shows the steps on how to create the key, generate the access tokens and the recommended ways to do it.

Getting your Smart Auth key

  1. If you do not have a token, generate one.

  2. Retrieve the clientId and clientSecret from one of the generated tokens.

You can repeat this procedure to generate accesses combining different functions and SDKs.

Generating your token

The following steps describe how you can generate a token that is valid only for a specific user. This is the recommended way to generate and distribute tokens because it limits a possible attack to a single user account.

  1. At some point in your application flow, create a JWT with the structure of the example below;

    • Remember to replace the {clientId}, {personId} and {expiresAt} fields.

    • All of these fields are strongly recommended, but you can see which ones are required at the bottom of this page.

  2. Sign the token with your clientSecret;

  3. Send this token to your application.

Example:

  1. Go to jwt.io;

  2. Keep the Header field, do not change;

  3. Edit the payload, only the iss field is required;

  4. Replace **** your-256-bit-secret with your clientSecret;

  5. Click Share JWT to copy the generated token to the clipboard;

  6. Use this token to authenticate the SDK.

JWT payload parameters

Parameter
Required
Description

iss

Yes

Your clientId

exp

No

Expiration time (seconds since the Unix Era)

personId

No

The CPF (Individual Taxpayer Registration Number) for which the token will be valid

Best practices for token-based authentication

To ensure a secure and reliable integration when using token-based authentication with our service, follow these recommended practices and avoid common pitfalls.

Practice
Description

Generate and sign tokens on the server

Always issue JWTs from your trusted backend system to avoid exposing signing keys.

Use HTTPS for all communications

Prevent man-in-the-middle attacks and ensure encryption in transit.

Use short expiration times for JWTs

Minimize the window for token misuse in case of interception. Tokens should typically expire within a few minutes.

Monitor token usage and behavior

Implement logging and monitoring to detect abnormal or suspicious activity.

❌ Unsafe practices

Practice
Risk

Generating tokens on the frontend

Exposes your signing keys and compromises the entire authentication system.

Storing signing keys or secrets in frontend/mobile apps

Secrets in client-side code can be extracted and misused.

Using long-lived tokens

Increases the window of vulnerability in case of leakage.

Hardcoding secrets in version-controlled code

Secrets in code repositories can be leaked or accessed by unauthorized users.

Security tip

Never expose your secrets, private keys, or JWT signing credentials on the client-side. Always treat tokens and secrets as sensitive data and follow the principle of least privilege.

Last updated