Manage users in R2R with built-in authentication
R2R provides a comprehensive set of user authentication and management features, allowing you to implement secure and feature-rich authentication systems in your applications.
To register a new user:
Response
If email verification is enabled, verify a user’s email:
Response
To log in and obtain access tokens:
Response
Retrieve information about the currently authenticated user:
Response
Refresh an expired access token:
Response
Change the user’s password:
Response
Request a password reset for a user:
Response
Confirm a password reset using the reset token:
Response
Update the user’s profile information:
Response
Delete the user’s account:
Response
Log out and invalidate the current access token:
Response
Superusers have additional privileges, including access to system-wide operations and sensitive information. To use superuser capabilities, authenticate as a superuser or the default admin:
Superuser actions should be performed with caution and only by authorized personnel. Ensure proper security measures are in place when using superuser capabilities.
When implementing user authentication, consider the following best practices:
For more advanced use cases or custom implementations, refer to the R2R documentation or reach out to the community for support.
Manage users in R2R with built-in authentication
R2R provides a comprehensive set of user authentication and management features, allowing you to implement secure and feature-rich authentication systems in your applications.
To register a new user:
Response
If email verification is enabled, verify a user’s email:
Response
To log in and obtain access tokens:
Response
Retrieve information about the currently authenticated user:
Response
Refresh an expired access token:
Response
Change the user’s password:
Response
Request a password reset for a user:
Response
Confirm a password reset using the reset token:
Response
Update the user’s profile information:
Response
Delete the user’s account:
Response
Log out and invalidate the current access token:
Response
Superusers have additional privileges, including access to system-wide operations and sensitive information. To use superuser capabilities, authenticate as a superuser or the default admin:
Superuser actions should be performed with caution and only by authorized personnel. Ensure proper security measures are in place when using superuser capabilities.
When implementing user authentication, consider the following best practices:
For more advanced use cases or custom implementations, refer to the R2R documentation or reach out to the community for support.