Authenticates the root user using HMAC signature for programmatic access. This endpoint is designed for automation scenarios like Infrastructure-as-Code deployments, CI/CD pipelines, and automated testing where magic link authentication is impractical.
Security Features:
How to generate the signature:
SECRET_KEY="your-notifuse-secret-key"
ROOT_EMAIL="[email protected]"
TIMESTAMP=$(date +%s)
MESSAGE="${ROOT_EMAIL}:${TIMESTAMP}"
SIGNATURE=$(echo -n "$MESSAGE" | openssl dgst -sha256 -hmac "$SECRET_KEY" | awk '{print $2}')
Request payload for root user programmatic signin using HMAC signature
The root user's email address (must match configured ROOT_EMAIL)
Unix timestamp (seconds since epoch). Must be within 60 seconds of server time.
1735600000
HMAC-SHA256 signature computed as: HMAC-SHA256(email + ":" + timestamp, SECRET_KEY) The signature should be hex-encoded.
"a1b2c3d4e5f6..."
Authentication successful
Successful authentication response containing JWT token and user details