Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
Authenticator apps (TOTP)
Push authentication
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
Managing Authenticators
Guides

How to enable self serve user authenticator management with Authsignal.

Steven Clouston
⬤
May 14, 2025
Share
How to add a button so users can manage their authenticators with Authsignal.

In the previous blog (How to Implement Passkeys for a Seamless E-Commerce Checkout Experience), we discussed implementing a secure and seamless checkout process using Authsignal’s email OTP and passkeys for passwordless authentication. Now, we’ll take it a step further and show you how to add a button that allows users to manage their authenticators directly from your e-commerce platform.

By integrating this feature, users can add, remove, or update their authenticators (such as email OTP, passkeys, etc.) through Authsignal’s pre-built UI. This ensures that users have complete control over their authentication methods, enhancing both security and convenience.

‍

‍

Step-by-Step Guide to Managing Authenticators

In this guide, we’ll focus on adding a “Manage Authenticators” button that, when clicked, will open Authsignal’s pre-built user interface for users to adjust their authentication methods. The backend will handle generating the necessary URL and tracking the action for Authsignal.

This guide uses Authsignal's Web and Node SDKs. Authsignal provides SDKs for a number of languages, so you can adapt this guide to suit your needs:

‍

Backend Setup: Manage Authenticators Endpoint

The first thing we need to do is create a new backend endpoint that will be responsible for generating the URL for managing authenticators. When the user clicks the “Manage” button, this endpoint will be called to trigger Authsignal’s pre-built UI.

Here’s how we can implement the /manage endpoint in the backend:

// POST /manage

import { Request, Response } from "express";
import { unsealData } from "iron-session"; // assuming iron-session is used

app.post("/manage", async (req: Request, res: Response) => {
  const token = req.cookies.authtoken;

  // validate the session token and retrieve userId

  const userId = session?.userId;

  if (!userId) {
    return res.status(401).json({ error: "Unauthorized" });
  }

  // Track a 'manage' action with Authsignal and get the URL for the pre-built UI
  const response = await authsignal.track({
    userId,
    redirectUrl: `${baseUrl}/account`, // Redirect back to account page after management
    action: "manage",
    redirectToSettings: true, // Open the authenticator settings directly
    deviceId: req.body.deviceId,
    userAgent: req.headers["user-agent"],
    ipAddress: requestIp.getClientIp(req) ?? undefined,
  });

  // Return the URL for the frontend to launch the UI
  res.status(201).json(response.url);
});

‍

Explanation:

  • Session Management: We retrieve the userId from the session token (stored in cookies). This session token is not related to Authsignal and is handled with a library of your choice.
  • Authsignal's track Method: We use the authsignal.track method to track a "manage" action and obtain the URL for managing authenticators. It's important to include redirectToSettings: true in the track call so that the user is taken to the settings menu. Learn more about tracking an action.
  • Redirect to Account Page: After managing authenticators, users will be redirected to the account page, but you could redirect to any page of your choice.

‍

Frontend Setup: Adding the Manage Button

Now, let’s create the account settings page on the frontend where users can manage their authenticators. We’ll add a button that calls the /manage endpoint, retrieves the URL, and redirects to Authsignal’s pre-built UI.

Here’s an example of how this might look:

‍

import { authsignal } from "./authsignal";
import { baseUrl } from "./utils";

export function Account() {
  const handleManage = async () => {
    try {
      // Call the /manage endpoint to get the URL
      const response = await fetch(`${baseUrl}/manage`, {
        method: "POST",
        headers: {
          "Content-Type": "application/json",
        },
        credentials: "include", // Ensure cookies are included
      });

      const url = await response.json();

      // Launch Authsignal's pre-built UI to manage authenticators
      await authsignal.launch(url);
    } catch (error) {
      console.error("Failed to launch authenticator management UI:", error);
    }
  };

  return (
    <div className="w-full mx-auto p-8 bg-white rounded-lg shadow-md">
      <h1 className="text-2xl font-bold mb-6">Settings</h1>

      <div className="mb-4">
        <div className="flex justify-between mt-4">
          <h2 className="text-lg">Authentication options:</h2>
          <div className="mb-6">
            <button
              onClick={handleManage}
              className="py-2 px-4 bg-simplifyBlue text-white font-semibold rounded-md hover:bg-blue-600"
            >
              Manage Authenticators
            </button>
          </div>
        </div>
      </div>
    </div>
  );
}

‍

Key Features:

  • Button Trigger: When the “Manage” button is clicked, the /manage endpoint is called to get the Authsignal URL.
  • Authsignal UI: Once the URL is retrieved, authsignal.launch(url) is called to display the pre-built UI where users can manage their authenticators. In this case we are using the pre-built UI in redirect mode. Learn more about redirect mode vs popup mode here.

If you want to launch the pre-built UI on your own domain, consider learning more about setting up a custom domain.

‍

Conclusion

By adding a “Manage Authenticators” button to your e-commerce platform, you empower users to control their authentication methods directly through Authsignal’s pre-built interface. This simplifies the process for both users and developers, ensuring a secure, seamless, and customizable experience.

To summarize, this follow-up guide has covered:

  • Setting up a backend /manage endpoint to handle the management of authenticators.
  • Creating a frontend account page with a button to launch Authsignal’s UI for managing authenticators.

By incorporating this functionality into your platform, you further enhance the user experience, giving customers control over their authentication settings while maintaining security and simplicity.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
Managing Authenticators
Guides

You might also like

How a global real estate company strengthened MFA with Authsignal
Azure AD B2C
Multi-factor authentication
Passkeys

How a global real estate company strengthened MFA with Authsignal

April 14, 2026
What is Visa VAMP? Thresholds, fees, and how it affects your dispute ratio
Visa VAMP
Chargebacks
Dispute Management

What is Visa VAMP? Thresholds, fees, and how it affects your dispute ratio

April 13, 2026
Authsignal joins IATA Strategic Partnership Program to advance digital identity adoption in travel and aviation
Partnerships
Airlines

Authsignal joins IATA Strategic Partnership Program to advance digital identity adoption in travel and aviation

April 10, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies