Skip to content


Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

build npm version


Easy authentication with OpenStreetMap over OAuth 2.0.
See also:

Note: If you want the older version of this library that supports OpenStreetMap over OAuth 1.0a, use the v1 branch and pin your software to older release versions <2. Going forward, the v1 branch will receive limited attention.


Try it out now at:

Or you can run the demo locally by cloning this project, then run:

$ npm install
$ npm run build
$ npm start

This will start a local server on port 8080. Then open in a browser.


Use in Node

To install osm-auth as a dependency in your project:

$  npm install --save osm-auth

osm-auth is distributed in CJS and ESM module formats for maxmimum compatibility. (Read more about Javascript module formats)

const osmAuth = require('osm-auth').osmAuth;   // CJS named import
// or
import { osmAuth } from 'osm-auth';   // ESM named import

Use in Browsers

You can also use osm-auth directly in a web browser. A good way to do this is to fetch the "iife" bundle from the jsDelivr CDN, which can even deliver minified versions.

When you load this file in a <script> tag, you'll get a osmAuth global to use elsewhere in your scripts:

<script src=""></script>
// example here


Requires land.html to be accessible, or a page that does the same thing - calls an auth complete function - to be available.


This project is tested in supported node versions and modern browsers. We attempt to use JavaScript syntax that will work in legacy environments like ES5 or Internet Explorer, but offer no guarantee that it will work. If you're targeting an environment like this, you're probably already building your own bundle with something like Babel.

Registering an application


Register a new OAuth2.0 application on

  1. Go to your user page
  2. Click 'My Settings'
  3. Click 'OAuth 2 applications'
  4. At the bottom, 'Register new application'
  5. Fill in the form & submit
  6. Copy & Paste the client ID, secret, redirect URI and scope(s) into the osmAuth config object as below

👉 Important:

  • Remember to copy the client_secret after setting up your application. It won't be available later.
  • The "Redirect URIs" are URIs that OSM is allowed to redirect the user back to. You can supply multiple Redirect URIs separated by spaces, and change them later.
  • Redirect URIs must use https, except for, which may use http


var redirectPath = window.location.origin + window.location.pathname;
var auth = osmAuth.osmAuth({
  client_id: "JWXSAzNp64sIRMStTnkhMRaMxSR964V4sFgn3KUZNTA",
  client_secret: "6umOXfkZqH5CVUtv6iDqN7k8o7mKbQvTrHvbDQH36hs",
  redirect_uri: redirectPath + "land.html",
  scope: "read_prefs",
  auto: true  // show a login form if the user is not authenticated and you try to do a call

document.getElementById("authenticate").onclick = function () {
  // Signed method call - since `auto` is true above, this will
  // automatically start an authentication process if the user isn't
  // authenticated yet.
  auth.xhr({ method: "GET", path: "/api/0.6/user/details" },
    function (err, result) {
      // result is an XML DOM containing the user details

Example with single-page

coming soon



Constructs an osmAuth instance.
At a minimum, options must contain OAuth2 client ID, secret, redirect URI, and scope(s):

var redirectPath = window.location.origin + window.location.pathname;
  client_id: "JWXSAzNp64sIRMStTnkhMRaMxSR964V4sFgn3KUZNTA",
  client_secret: "6umOXfkZqH5CVUtv6iDqN7k8o7mKbQvTrHvbDQH36hs",
  redirect_uri: redirectPath + "land.html",
  scope: "read_prefs"

Additional options are:

  • access_token - Can pre-authorize with an OAuth2 bearer token if you have one
  • url - A base url (default: "")
  • auto - If true, attempt to authenticate automatically when calling .xhr() (default: false)
  • singlepage - If true, use page redirection instead of a popup (default: false)
  • loading - Function called when auth-related xhr calls start
  • done - Function called when auth-related xhr calls end


Removes any stored authentication tokens (legacy OAuth1 tokens too)

Returns: self


Test whether the user is currently authenticated

Returns: true if authenticated, false if not


First logs out, then runs the authentiation flow, finally calls the callback.

Param: callback An "errback"-style callback (err, result), called when complete
Returns: none


Tries to bring an existing authentication popup to the front.

Returns: true on success or false if there is no authentication popup or if it couldn't be brought to the front (e.g. because of cross-origin restrictions).

.bootstrapToken(auth_code, callback)

The authorization code is a temporary code that a client can exchange for an access token. If using this library in single-page mode, you'll need to call this once your application has an auth_code and wants to get an access_token.
Param: auth_code The OAuth2 auth_code
Param: callback An "errback"-style callback (err, result), called when complete
Returns: none

.xhr(options, callback)

A XMLHttpRequest wrapper that does authenticated calls if the user has logged in.

Param: options:
options.method Passed to (e.g. 'GET', 'POST')
options.prefix If true path contains a path, if false path contains the full url
options.path The URL path (e.g. "/api/0.6/user/details") (or full url, if prefix=false)
options.content Passed to xhr.send
options.headers optional Object containing request headers
Param: callback An "errback"-style callback (err, result), called when complete
Return: XMLHttpRequest if authenticated, otherwise null

rawxhr(method, url, access_token, data, headers, callback)

Creates the XMLHttpRequest set up with a header and response handling.

Param: method Passed to (e.g. 'GET', 'POST')
Param: url Passed to
Param: access_token The OAuth2 bearer token
Param: data Passed to xhr.send
Param: headers Object containing request headers
Param: callback An "errback"-style callback (err, result), called when complete
Return: XMLHttpRequest


Pre-authorize this object, if we already have the bearer token from the start.

Param: val Object containing access_token property
Return: self


Options (getter / setter)
If passed with no arguments, just return the options
If passed an Object, set the options then attempt to pre-authorize

Param: val? Object containing options
Return: current options (if getting), or self (if setting)