Use when you need to implement CloudBase Auth v2 over raw HTTP endpoints (login/signup, tokens, user operations) from backends or scripts that are not using the Web or Node SDKs.
Installation
Details
Usage
After installing, this skill will be available to your AI coding assistant.
Verify installation:
skills listSkill Instructions
name: auth-http-api-cloudbase description: Use when you need to implement CloudBase Auth v2 over raw HTTP endpoints (login/signup, tokens, user operations) from backends or scripts that are not using the Web or Node SDKs. alwaysApply: false
When to use this skill
Use this skill whenever you need to call CloudBase Auth via raw HTTP APIs, for example:
- Non-Node backends (Go, Python, Java, PHP, etc.)
- Integration tests or admin scripts that use curl or language HTTP clients
- Gateways or proxies that sit in front of CloudBase and manage tokens themselves
Do not use this skill for:
- Frontend Web login with
@cloudbase/js-sdk@2.x(use CloudBase Web Auth skill) - Node.js code that uses
@cloudbase/node-sdk(use CloudBase Node Auth skill) - Non-auth CloudBase features (database, storage, etc.)
How to use this skill (for a coding agent)
-
Clarify the scenario
- Confirm this code will call HTTP endpoints directly (not SDKs).
- Ask for:
env– CloudBase environment IDclientId/clientSecret– HTTP auth client credentials
- Confirm whether the flow is login/sign-up, anonymous access, token management, or user operations.
-
Set common variables once
- Use a shared set of shell variables for base URL and headers, then reuse them across scenarios.
-
Pick a scenario from this file
- For login / sign-up, start with Scenarios 1–3.
- For token lifecycle, use Scenarios 4–6.
- For user info and profile changes, use Scenario 7.
-
Never invent endpoints or fields
- Treat the URLs and JSON shapes in this file as canonical.
- If you are unsure, consult the HTTP API docs under
/source-of-truth/auth/http-api/登录认证接口.info.mdxand the specific*.api.mdxfiles.
HTTP API basics
-
Base URL pattern
https://${env}.ap-shanghai.tcb-api.tencentcloudapi.com/auth/v1/...
-
Common headers
x-device-id– device or client identifierx-request-id– unique request ID for tracingAuthorization–Bearer <access_token>for user endpoints- Or HTTP basic auth (
-u clientId:clientSecret) for client-credential style endpoints
-
Reusable shell variables
env="your-env-id"
deviceID="backend-service-1"
requestID="$(uuidgen || echo manual-request-id)"
clientId="your-client-id"
clientSecret="your-client-secret"
base="https://${env}.ap-shanghai.tcb-api.tencentcloudapi.com/auth/v1"
Core concepts (HTTP perspective)
- CloudBase Auth uses JWT access tokens plus refresh tokens.
- HTTP login/sign-up endpoints usually return both
access_tokenandrefresh_token. - Most user-management endpoints require
Authorization: Bearer ${accessToken}. - Verification flows (SMS/email) use separate
verificationendpoints before sign-up.
Scenarios (flat list)
Scenario 1: Sign-in with username/password
curl "${base}/signin" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{"username":"test@example.com","password":"your password"}'
- Use when the user already has a username (phone/email/username) and password.
- Response includes
access_token,refresh_token, and user info.
Scenario 2: SMS sign-up with verification code
- Send verification code
curl "${base}/verification" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{"phone_number":"+86 13800000000"}'
- Verify code
curl "${base}/verification/verify" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{"verification_code":"000000","verification_id":"<from previous step>"}'
- Sign up
curl "${base}/signup" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{
"phone_number":"+86 13800000000",
"verification_code":"000000",
"verification_token":"<from verify>",
"name":"手机用户",
"password":"password",
"username":"username"
}'
- Use this pattern for SMS or email-based registration; adapt fields per docs.
Scenario 3: Anonymous login
curl "${base}/signin-anonymously" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{}'
- Returns tokens for an anonymous user that you can later upgrade via sign-up.
Scenario 4: Exchange refresh token for new access token
curl "${base}/token" \
-X POST \
-H "x-device-id: ${deviceID}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{"grant_type":"refresh_token","refresh_token":"<refresh_token>"}'
- Use when the frontend or another service sends you a refresh token and you need a fresh access token.
Scenario 5: Introspect and validate a token
curl "${base}/token/introspect?token=${accessToken}" \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}"
- Use for backend validation of tokens before trusting them.
- Response indicates whether the token is active and may include claims.
Scenario 6: Revoke a token (logout)
curl "${base}/revoke" \
-X POST \
-H "x-request-id: ${requestID}" \
-u "${clientId}:${clientSecret}" \
--data-raw '{"token":"${accessToken}"}'
- Call when logging a user out from the backend or on security events.
Scenario 7: Basic user operations (me, update password, delete)
# Get current user
curl "${base}/user/me" \
-H "Authorization: Bearer ${accessToken}"
# Change password
curl "${base}/user/password" \
-X PATCH \
-H "Authorization: Bearer ${accessToken}" \
--data-raw '{"old_password":"old","new_password":"new"}'
- Other endpoints:
DELETE ${base}/user/me– delete current user.${base}/user/providersplus bind/unbind APIs – manage third-party accounts.
- Always secure these operations and log only minimal necessary data.
More by TencentCloudBase
View allCloudBase platform knowledge and best practices. Use this skill for general CloudBase platform understanding, including storage, hosting, authentication, cloud functions, database permissions, and data models.
CloudBase Run backend development rules (Function mode/Container mode). Use this skill when deploying backend services that require long connections, multi-language support, custom environments, or AI agent development.
Optional advanced tool for complex data modeling. For simple table creation, use relational-database-tool directly with SQL statements.
Use CloudBase Auth tool to configure and manage authentication providers for web applications - enable/disable login methods (SMS, Email, WeChat Open Platform, Google, Anonymous, Username/password, OAuth, SAML, CAS, Dingding, etc.) and configure provider settings via MCP tools.