Allow guest users to use your apps and website and promote to regular users later.
Overview
You can use create an Anonymous User account for the guests in your apps, so they can carry out interactions just like a normal user. For example, guests can post comments and save preferences in your social platform before setting email and password. The user session will persist even if the app has been closed.
This improves the app experience because the user does not need to set up authenticators until further down the user journey, while still enjoying most of the app features. For app developers, the ability to create and assign Anonymous User also makes it easier to link the activities of an individual before and after sign-up.
Enable Anonymous User for your project
In the portal, go to Authentication > Anonymous Users.
Turn on Enable anonymous users.
Save the settings.
Using the SDK
Sign up as an Anonymous User
This will create an Anonymous User for the session. Subsequent requests from the end-user in the session can be identified by the same sub
authgear
.authenticateAnonymously()
.then(({userInfo}) => {
// Logged in as anonymous user successfully
})
.catch((err) => {
// Handle the error
});
try {
final userInfo = await authgear.authenticateAnonymously();
// Logged in as anonymous user successfully
} catch (e) {
// Handle the error
}
authgear.authenticateAnonymously { result in
switch result {
case let .success(userInfo):
// Logged in as anonymous user successfully
case let .failure(error):
// Handle the error
}
}
mAuthgear.authenticateAnonymously(new OnAuthenticateAnonymouslyListener() {
@Override
public void onAuthenticated(@NonNull UserInfo userInfo) {
// Logged in as anonymous user successfully
}
@Override
public void onAuthenticationFailed(@NonNull Throwable throwable) {
// Handle the error
}
});
authgear
.authenticateAnonymously()
.then(({userInfo}) => {
// Logged in as anonymous user successfully
})
.catch((err) => {
// Handle the error
});
promoteAnonymousUser function can be called to promote an anonymous user to a regular user with login ID (e.g. email, phone number) and authenticators (e.g. password). The end-user will be prompted a sign up page to complete the promotion. The sub of an end-user will remain the same after promotion.
try {
final userInfo = await authgear.promoteAnonymousUser(redirectURI: THE_REDIRECT_URI);
// Promote anonymous user successfully
} catch (e) {
// Handle the error
}
authgear.promoteAnonymousUser(
redirectURI: THE_REDIRECT_URI
) { result in
switch result {
case let .success(userInfo):
// Promote anonymous user successfully
case let .failure(error):
// Handle the error
}
}
PromoteOptions options = new PromoteOptions(THE_REDIRECT_URI);
authgear.promoteAnonymousUser(options, new OnPromoteAnonymousUserListener() {
@Override
public void onPromoted(@NonNull UserInfo userInfo) {
// Promote anonymous user successfully
}
@Override
public void onPromotionFailed(@NonNull Throwable throwable) {
// Handle the error
}
});
Step 1: Start the promotion flow
When the user clicks promote on your website, make a start promotion call to redirect them to the promotion page.
authgear
.startPromoteAnonymousUser({
// Configure redirectURI which users will be redirected to
// after they have promoted with Authgear.
// You can use any path in your website.
// Make sure it is in the "Redirect URIs" list of the Application.
// The redirect uri for anonymous user promotion should be
// different from the one for normal user authentication.
// e.g. "https://yourdomain.com/promote-redirect"
redirectURI: THE_REDIRECT_URI,
})
.then(({userInfo}) => {
// Started the promotion flow
})
.catch((err) => {
// Failed to start the promotion flow
});
Step 2: Handle the promotion result
After the user promotes on the promotion page, the user will be redirected to the redirectURL with a code parameter in the URL query. In the redirectURI of your application, make a finish promotion call to handle the promotion result.
authgear
.finishPromoteAnonymousUser()
.then(({userInfo}) => {
// Promoted successfully
// You should redirect the user to another path
})
.catch((err) => {
// Failed to finish promotion
});
);
User Lifetime
Mobile apps
On Mobile SDKs, creating an anonymous user will create a key-pair. The key-pair is stored in the native encrypted store on the mobile device. The end-user can always re-login to the same anonymous user with the key-pair. Such anonymous user will become inaccessible when the encrypted store is removed.
Web apps and websites
On the Web SDK, there will be no key-pair created. Therefore the end-user will not be able to login to the same Anonymous User after the their session become invalid. For cookie-based authentication, it is controlled by the "idle timeout" and "session lifetime" of the Cookie. For token-based authentication, it is controlled by the "idle timeout" and "token lifetime" of the Refresh Token.
In other words, The anonymous user account lifetime is the same as the logged-in session lifetime.
To adjust the lifetime settings, change the timeouts and lifetimes in Portal > Applications accordingly.
Caution for high-traffic websites
You should create anonymous users only when necessary in the user journey to prevent creating excessive orphan accounts in your tenant.