SvelteKit is a framework for building web applications with flexible filesystem-based routing and a unified approach to server-side and client-side logic. This example demonstrates how to integrate Zitadel using the OAuth 2.0 PKCE flow to authenticate users securely and maintain sessions across your application.
This example uses @auth/sveltekit, the SvelteKit integration of @auth/core (formerly NextAuth.js). Auth.js provides a complete authentication solution that handles the OpenID Connect protocol, manages PKCE code generation and verification, performs secure token exchange, and provides session management utilities across your SvelteKit application.
This example provides a complete authentication implementation showing how to secure a SvelteKit application with Zitadel. Users start on a public landing page and click a login button to authenticate through Zitadel's authorization server using the PKCE flow. After successful authentication, they're redirected to a protected profile page that displays their user information and claims.
The logout flow implements federated logout with proper CSRF protection, terminating both the local application session and the Zitadel session before redirecting users back to your application. Custom error pages provide user-friendly messages for authentication failures, and the example includes comprehensive security headers configured through SvelteKit's hooks.
Before running this example, you need to create and configure a PKCE application in the ZITADEL Management Console. Follow the PKCE application setup guide to:
Note: Make sure to enable Dev Mode in the ZITADEL Management Console if you're using HTTP URLs during local development. For production, always use HTTPS URLs and disable Dev Mode.
Create a .env.local file in the project root and configure it with the values from your Zitadel application. Use these exact environment variable names: