This guide is about authentication for your app’s visitors — the users who sign in to the site you built. Your own Hiveku account login is separate and managed for you.
Easiest
Ask the AI assistant
Visual
Use the Auth panel
For developers
Edit Supabase config
Option 1: Ask the AI Assistant (Easiest)
Provide your OAuth credentials when prompted
The AI will ask for the client ID and secret from your Google OAuth app. If you don’t have one yet, follow Create a Google OAuth App first.
Option 2: Auth Panel (Visual)
Open Database > Auth and work through the sub-tabs.OAuth Providers
Pick a provider
On the OAuth tab, toggle on any of: Google, GitHub, Apple, Discord, Facebook, Spotify, Slack, LinkedIn.
Create an OAuth app in the provider's console
Each provider needs you to register an app to get a client ID and secret. For Google, see Create a Google OAuth App.When the provider asks for the redirect URL, paste this exact format:Your Supabase reference is shown at the top of the Auth panel.
Paste credentials into Hiveku
Back in the Auth panel, paste the Client ID and Client Secret into the fields next to the provider toggle. Click Save.
Email/Password
Email sign-up requires transactional email to work. Configure SMTP first (on the SMTP tab) — Hiveku supports SendGrid, Postmark, Resend, AWS SES, and generic SMTP. Once SMTP is configured, email/password sign-up, password reset, and email verification all work automatically.Roles, RLS, and Policies
- Roles — define app roles (e.g.,
admin,editor,viewer) used by your frontend - RLS — row-level security toggles per table
- Policies — pre-built templates you can apply with one click:
- Public read
- Authenticated read
- Owner access (users only see their own rows)
- Admin-only
- Service-role-only
Templates
Customize the look and copy of auth emails: verification, password reset, magic link, email change. Variables like{{ .ConfirmationURL }} are inserted at send time.
Option 3: Edit Supabase Config Directly
For advanced setups (custom hooks, SAML, MFA beyond the built-ins), click Open Supabase Studio from the Auth tab header. You land in the linked Supabase project’s Auth settings with full control.Verifying Auth Works
Sign up as a test user
Use a throwaway email (or a Gmail alias:
you+test@gmail.com). Complete the flow.Troubleshooting
OAuth error: redirect_uri_mismatch
OAuth error: redirect_uri_mismatch
The redirect URL in your provider’s OAuth console must match exactly — including
https://, the correct Supabase subdomain, and /auth/v1/callback. Copy the URL shown at the top of the Hiveku Auth panel and paste it into the provider console exactly.Queries return empty or 'permission denied'
Queries return empty or 'permission denied'
Row-level security is likely enabled without a policy. Either add a policy (the Owner access template is a good default) or use the service role key in backend code. See the Policies sub-tab.
Password reset or verification emails not sending
Password reset or verification emails not sending
SMTP isn’t configured or is misconfigured. Go to Database > Auth > SMTP and set up a provider. Without SMTP, Supabase uses a low-volume default that won’t scale and may silently drop messages.
Google sign-in shows "Access blocked: app not verified"
Google sign-in shows "Access blocked: app not verified"
Your Google OAuth app is in testing mode. Either add test users in the Google Cloud Console (OAuth consent screen > Test users), or submit the app for verification. Internal apps inside a Google Workspace don’t need verification.
User signs up but can't sign in
User signs up but can't sign in
Check whether email confirmation is required (Auth settings). If yes, the user needs to click the verification link before logging in. You can also disable confirmation requirement while testing.
What’s Next?
Create Database Tables
Build the schema your authenticated users will read and write
Create a Google OAuth App
Step-by-step walkthrough for Google sign-in