KeyAuth Vue 3 TypeScript example application with full 2FA support for https://keyauth.cc license key API auth.
Built with Vue 3, Vue Router, TypeScript, Vite, and Tailwind CSS
Uses npm or bun for package management.
- π Complete Authentication System - Login with username/password or license key
- π‘οΈ Two-Factor Authentication (2FA) - Full 2FA support with QR code setup
- π¨ Modern UI - Clean, responsive design matching KeyAuth branding
- β‘ Vue 3 Composition API - Modern Vue with script setup and composables
- π Secure Session Management - Cookie-based authentication with composables
- π± Mobile Responsive - Works seamlessly on all device sizes
- π TypeScript - Full type safety throughout the application
-
Clone the repository
git clone https://github.com/KeyAuth/KeyAuth-Vue-Example.git cd KeyAuth-Vue-Example -
Install dependencies
npm install # or bun install -
Configure your KeyAuth application
Edit
src/credentials.tswith your KeyAuth application details:export const name: string = ""; // Application name export const ownerid: string = ""; // Owner ID export const url: string = "https://keyauth.win/api/1.3/"; // API URL (change if self-hosted)
-
Run the development server
npm run dev # or bun dev -
Open your browser
Navigate to http://localhost:5173
If you are using our example with no significant changes and having problems, please report bugs here: https://keyauth.cc/app/?page=forms
However, we do NOT provide support for adding KeyAuth to your project. If you can't figure this out, use Google or YouTube to learn more about Vue development.
src/
βββ views/
β βββ Home.vue # Main login page
β βββ Dashboard.vue # User dashboard
βββ components/
β βββ Login.vue # Login component with 2FA support
β βββ TwoFALogin.vue # 2FA verification component
β βββ TwoFASetup.vue # 2FA setup/disable modal
βββ composables/
β βββ useAuth.ts # Authentication composable
βββ router/
β βββ index.ts # Vue Router configuration
βββ lib/
β βββ keyauth.ts # KeyAuth API client
β βββ cookies.ts # Cookie management utilities
βββ assets/
β βββ main.css # Main styles
β βββ base.css # Base/Tailwind styles
βββ App.vue # Root component
βββ main.js # Application entry point
βββ credentials.ts # Application credentials
Users can authenticate using username/password:
// In your component
const { login, loading } = useAuth();
const handleLogin = async () => {
const result = await login(username.value, password.value);
if (result.success) {
router.push('/dashboard');
}
};Direct authentication with license keys:
const { licenseAuth } = useAuth();
const handleLicenseLogin = async () => {
const result = await licenseAuth(licenseKey.value);
if (result.success) {
router.push('/dashboard');
}
};const { enable2FA } = useAuth();
// This returns a QR code URL for the user to scan
const result = await enable2FA();
if (result.success) {
// Show QR code: result.qrCode
// Secret code: result.secret
}When 2FA is enabled, the login flow automatically detects and redirects to 2FA verification:
const { loginWith2FA } = useAuth();
const handleVerify2FA = async (code: string) => {
const result = await loginWith2FA(username.value, password.value, code);
if (result.success) {
router.push('/dashboard');
}
};const { disable2FA } = useAuth();
const handleDisable2FA = async (code: string) => {
const result = await disable2FA(code);
if (result.success) {
// 2FA disabled successfully
}
};const { register } = useAuth();
const handleRegister = async () => {
const result = await register(username.value, password.value, licenseKey.value);
if (result.success) {
router.push('/dashboard');
}
};Users can upgrade their accounts with additional license keys:
const { upgrade } = useAuth();
const handleUpgrade = async () => {
const result = await upgrade(username.value, licenseKey.value);
if (result.success) {
// Show success message
} else {
// Show error: result.message
}
};Access current user information through the composable:
const { user, isAuthenticated } = useAuth();
// User object contains:
console.log({
username: user.value?.username,
ip: user.value?.ip,
hwid: user.value?.hwid,
expires: user.value?.expires,
subscriptions: user.value?.subscriptions,
createdate: user.value?.createdate,
lastlogin: user.value?.lastlogin,
subscription: user.value?.subscription
});Display app statistics:
const { keyauth } = useAuth();
// Access app data
const appData = keyauth.value?.app_data;
console.log({
numUsers: appData?.numUsers,
onlineUsers: appData?.onlineUsers,
numKeys: appData?.numKeys,
version: appData?.app_ver,
customerPanel: appData?.customer_panel
});const { logout, keyauth } = useAuth();
// Check if session is valid
const isValid = await keyauth.value?.check();
// Logout user
logout();
router.push('/');const { keyauth } = useAuth();
const isBlacklisted = await keyauth.value?.checkblacklist();
if (isBlacklisted) {
// Handle blacklisted user
}const { keyauth } = useAuth();
// Ban current user (must be logged in)
await keyauth.value?.ban();Send logs to KeyAuth dashboard:
const { keyauth } = useAuth();
await keyauth.value?.log("User performed action X");const { keyauth } = useAuth();
const value = await keyauth.value?.var("variableName");const { keyauth } = useAuth();
// Get user variable
const userValue = await keyauth.value?.getvar("varName");
// Set user variable
await keyauth.value?.setvar("varName", "varValue");const { keyauth } = useAuth();
const fileBytes = await keyauth.value?.file("fileId");
// Handle file bytes as neededconst { keyauth } = useAuth();
const messages = await keyauth.value?.chatGet("channelName");
messages.forEach(msg => {
console.log(`${msg.author}: ${msg.message}`);
});const { keyauth } = useAuth();
await keyauth.value?.chatSend("Hello everyone!", "channelName");Send secure server-side requests:
const { keyauth } = useAuth();
// GET request
const response1 = await keyauth.value?.webhook("webhookId", "¶m=value");
// POST with form data
const response2 = await keyauth.value?.webhook(
"webhookId",
"",
"key=value&key2=value2",
"application/x-www-form-urlencoded"
);
// POST with JSON
const response3 = await keyauth.value?.webhook(
"webhookId",
"",
JSON.stringify({ message: "Hello" }),
"application/json"
);npm run dev
# or
bun devnpm run build
npm run preview
# or
bun run build
bun run previewThe application uses Tailwind CSS with custom KeyAuth design tokens. Main colors:
/* Custom background colors */
.bg-custom-back { /* Dark background */ }
.bg-custom-back-1 { /* Darker background */ }
.bg-custom-back-lbl { /* Label background */ }
/* Custom border */
.border-custom { /* Dark border */ }The useAuth composable provides all authentication state and methods. It's automatically initialized when imported:
<script setup lang="ts">
import { useAuth } from '@/composables/useAuth';
const { isAuthenticated, user, keyauth, loading } = useAuth();
// Access user data
const username = computed(() => user.value?.username);
// Call auth methods
const handleLogin = async () => {
const result = await login(username.value, password.value);
// Handle result
};
</script>This is common amongst all authentication systems. Program obfuscation causes false positives in virus scanners, and with the scale of KeyAuth this is perceived as a malicious domain. So, keyauth.com and keyauth.win have been blocked by many internet providers. For dashboard, reseller panel, customer panel, use keyauth.cc.
For API, keyauth.cc will not work because it's purposefully blocked there so keyauth.cc doesn't get blocked also. You should create your own domain and follow this tutorial video: https://www.youtube.com/watch?v=a2SROFJ0eYc
KeyAuth is a powerful cloud-based authentication system designed to protect your software from piracy and unauthorized access. With KeyAuth, you can implement secure licensing, user management, and subscription systems in minutes. Client SDKs available for C#, C++, Python, Java, JavaScript, VB.NET, PHP, Rust, Go, Lua, Ruby, and Perl.
KeyAuth has several unique features such as memory streaming, webhook function where you can send requests to API without leaking the API, discord webhook notifications, ban the user securely through the application at your discretion. Feel free to join https://t.me/keyauth if you have questions or suggestions.
KeyAuth is licensed under Elastic License 2.0
-
You may not provide the software to third parties as a hosted or managed service, where the service provides users with access to any substantial set of the features or functionality of the software.
-
You may not move, change, disable, or circumvent the license key functionality in the software, and you may not remove or obscure any functionality in the software that is protected by the license key.
-
You may not alter, remove, or obscure any licensing, copyright, or other notices of the licensor in the software. Any use of the licensor's trademarks is subject to applicable law.
Thank you for your compliance, we work hard on the development of KeyAuth and do not appreciate our copyright being infringed.
- π KeyAuth Documentation
- π¬ Telegram Community
- π Bug Reports
- π KeyAuth Dashboard