Everruns supports flexible authentication modes for different deployment scenarios, from no authentication in local development to full OAuth-based authentication in production.Documentation Index
Fetch the complete documentation index at: https://mintlify.com/everruns/everruns/llms.txt
Use this file to discover all available pages before exploring further.
Authentication Modes
The platform supports four authentication modes controlled by theAUTH_MODE environment variable:
None Mode
Admin Mode
Full Mode
External Mode
Authentication Methods
When authentication is enabled, you can authenticate requests using one of three methods:1. Bearer Token (JWT)
Include your access token in the Authorization header:- Access tokens are short-lived (default: 15 minutes)
- Refresh tokens are stored in the database for revocation
- Tokens include user ID, email, name, and roles
Access tokens expire after 15 minutes by default. Use the refresh endpoint to obtain a new token pair.
2. API Key
API keys provide long-lived authentication for programmatic access:- Prefixed with
evr_for identification - Full key shown only at creation time
- Stored hashed using SHA-256
- Support scopes and expiration
- Ideal for server-to-server communication
API keys are shown only once at creation. Store them securely - they cannot be retrieved later.
3. Cookie-based Session
Used by the web UI for browser-based authentication:access_tokencookie contains the JWTrefresh_tokencookie (HTTP-only, secure) for token renewal
Managing API Keys
Create API Key
List API Keys
Delete API Key
OAuth Providers
In full authentication mode, OAuth2 is supported with the following providers:Google OAuth
- Uses OpenID Connect
- Requires email and profile scopes
- Supports email domain restrictions
GitHub OAuth
- Requires
user:emailandread:userscopes - Supports account linking by email
Accounts are automatically linked when the same email is used across different OAuth providers.
Token Refresh
When your access token expires, use the refresh endpoint:Refresh tokens are rotated on each use. The old token is invalidated when a new pair is issued.
Authentication Configuration
Query the current authentication configuration:Current User Information
Retrieve information about the authenticated user:Security Considerations
Token Storage
- Store access tokens securely in memory
- Never expose tokens in URLs or logs
- Refresh tokens should be stored in secure, HTTP-only cookies for browser clients
API Key Security
- API keys are hashed using SHA-256 before storage
- Full key is displayed only once at creation
- Treat API keys like passwords - never commit them to source control
- Rotate keys regularly and delete unused keys
Password Requirements
- Minimum 8 characters
- Hashed using Argon2id with secure defaults
CORS Configuration
For cross-origin requests, configure allowed origins:Error Responses
See the Error Handling page for authentication-related error codes:401 Unauthorized- Missing or invalid credentials403 Forbidden- Valid credentials but insufficient permissions