Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 6, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 6, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 6, 2025

      In MCP era API discoverability is now more important than ever

      June 5, 2025

      Black Myth: Wukong is coming to Xbox exactly one year after launching on PlayStation

      June 6, 2025

      Reddit wants to sue Anthropic for stealing its data, but the Claude AI manufacturers vow to “defend ourselves vigorously”

      June 6, 2025

      Satya Nadella says Microsoft makes money every time you use ChatGPT: “Every day that ChatGPT succeeds is a fantastic day”

      June 6, 2025

      Multiple reports suggest a Persona 4 Remake from Atlus will be announced during the Xbox Games Showcase

      June 6, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      TC39 advances numerous proposals at latest meeting

      June 6, 2025
      Recent

      TC39 advances numerous proposals at latest meeting

      June 6, 2025

      TypeBridge – zero ceremony, compile time rpc for client and server com

      June 6, 2025

      Simplify Cloud-Native Development with Quarkus Extensions

      June 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Black Myth: Wukong is coming to Xbox exactly one year after launching on PlayStation

      June 6, 2025
      Recent

      Black Myth: Wukong is coming to Xbox exactly one year after launching on PlayStation

      June 6, 2025

      Reddit wants to sue Anthropic for stealing its data, but the Claude AI manufacturers vow to “defend ourselves vigorously”

      June 6, 2025

      Satya Nadella says Microsoft makes money every time you use ChatGPT: “Every day that ChatGPT succeeds is a fantastic day”

      June 6, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»OTP Authentication in Laravel & Vue.js for Secure Transactions

    OTP Authentication in Laravel & Vue.js for Secure Transactions

    April 20, 2025

    Introduction

    In today’s digital world, security is paramount, especially when dealing with sensitive data like user authentication and financial transactions. One of the most effective ways to enhance security is by implementing One-Time Password (OTP) authentication. This article explores how to implement OTP authentication in a Laravel backend with a Vue.js frontend, ensuring secure transactions.

    Why Use OTP Authentication?

    OTP authentication provides an extra layer of security beyond traditional username and password authentication. Some key benefits include:

    • Prevention of Unauthorized Access: Even if login credentials are compromised, an attacker cannot log in without the OTP.
    • Enhanced Security for Transactions: OTPs can be used to confirm high-value transactions, preventing fraud.
    • Temporary Validity: Since OTPs expire after a short period, they reduce the risk of reuse by attackers.

    Prerequisites

    Before getting started, ensure you have the following:

    • Laravel 8 or later installed
    • Vue.js configured in your project
    • A mail or SMS service provider for sending OTPs (e.g., Twilio, Mailtrap)
    • Basic understanding of Laravel and Vue.js

    In this guide, we’ll implement OTP authentication in a Laravel (backend) and Vue.js (frontend) application. We’ll cover:

    • Setting up Laravel and Vue (frontend) from scratch
    • Setting up OTP generation and validation in Laravel
    • Creating a Vue.js component for OTP input
    • Integrating OTP authentication into login workflows
    • Enhancing security with best practices

    By the end, you’ll have a fully functional OTP authentication system ready to enhance the security of your fintech or web application.

    Setting Up Laravel for OTP Authentication

    Step 1: Install Laravel and Required Packages

    If you haven’t already set up a Laravel project, create a new one:

    composer create-project "laravel/laravel:^10.0" example-app
    

    Next, install the Laravel Breeze package for frontend scaffolding:

    composer require laravel/breeze --dev
    

    After composer has finished installing, run the following command to select the framework you want to use—the Vue configuration:

    php artisan breeze:install
    

    You’ll see a prompt with the available stacks:

    Which Breeze stack would you like to install?
    - Vue with Inertia   
    Would you like any optional features?
    - None   
    Which testing framework do you prefer? 
    - PHPUnit
    

    Breeze will automatically install the necessary packages for your Laravel Vue project. You should see:

    INFO Breeze scaffolding installed successfully.
    

    Now run the npm command to build your frontend assets:

    npm run dev
    

    Then, open another terminal and launch your Laravel app:

    php artisan serve
    

    Step 2: Setting up OTP generation and validation in Laravel

    We’ll use a mail testing platform called Mailtrap to send and receive mail locally. If you don’t have a mail testing service set up, sign up at Mailtrap to get your SMTP credentials and add them to your .env file:

    MAIL_MAILER=smtp
    MAIL_HOST=sandbox.smtp.mailtrap.io
    MAIL_PORT=2525
    MAIL_USERNAME=1780944422200a
    MAIL_PASSWORD=a8250ee453323b
    MAIL_ENCRYPTION=tls
    MAIL_FROM_ADDRESS=hello@example.com
    MAIL_FROM_NAME="${APP_NAME}"
    

    To send OTPs to users, we’ll use Laravel’s built-in mail services. Create a mail class and controller:

    php artisan make:mail OtpMail
    php artisan make:controller OtpController
    

    Then modify the OtpMail class:

    <?php
    
    namespace AppMail;
    
    use IlluminateBusQueueable;
    use IlluminateContractsQueueShouldQueue;
    use IlluminateMailMailable;
    use IlluminateMailMailablesContent;
    use IlluminateMailMailablesEnvelope;
    use IlluminateQueueSerializesModels;
    
    class OtpMail extends Mailable
    {
        use Queueable, SerializesModels;
    
        public $otp;
    
        /**
         * Create a new message instance.
         */
        public function __construct($otp)
        {
            $this->otp = $otp;
        }
    
        /**
         * Build the email message.
         */
        public function build()
        {
            return $this->subject('Your OTP Code')
                ->view('emails.otp')
                ->with(['otp' => $this->otp]);
        }
    
        /**
         * Get the message envelope.
         */
        public function envelope(): Envelope
        {
            return new Envelope(
                subject: 'OTP Mail',
            );
        }
    }
    

    Create a Blade view in resources/views/emails/otp.blade.php:

    <!DOCTYPE html>
    <html>
        <head>
            <title>Your OTP Code</title>
        </head>
        <body>
            <p>Hello,</p>
            <p>Your One-Time Password (OTP) is: <strong>{{ $otp }}</strong></p>
            <p>This code is valid for 10 minutes. Do not share it with anyone.</p>
            <p>Thank you!</p>
        </body>
    </html>
    

    Step 3: Creating a Vue.js component for OTP input

    Normally, after login or registration, users are redirected to the dashboard. In this tutorial, we add an extra security step that validates users with an OTP before granting dashboard access.

    Create two Vue files:

    • Request.vue: requests the OTP
    • Verify.vue: inputs the OTP for verification

    Now we create the routes for the purpose of return the View and the functionality of creating OTP codes, storing OTP codes, sending OTP codes through the mail class, we head to our web.php file:

    Route::middleware('auth')->group(function () {
        Route::get('/request', [OtpController::class, 'create'])->name('request');
        Route::post('/store-request', [OtpController::class, 'store'])->name('send.otp.request');
    
        Route::get('/verify', [OtpController::class, 'verify'])->name('verify');
        Route::post('/verify-request', [OtpController::class, 'verify_request'])->name('verify.otp.request');
    });
    

    Putting all of this code in the OTP controller returns the View for our request.vue and verify.vue file and the functionality of creating OTP codes, storing OTP codes, sending OTP codes through the mail class and verifying OTP codes, we head to our web.php file to set up the routes.

    public function create(Request $request)
    {
        return Inertia::render('Request', [
            'email' => $request->query('email', ''),
        ]);
    }
    
    public function store(Request $request)
    {
        $request->validate([
            'email' => 'required|email|exists:users,email',
        ]);
    
        $otp = rand(100000, 999999);
    
        Cache::put('otp_' . $request->email, $otp, now()->addMinutes(10));
    
        Log::info("OTP generated for " . $request->email . ": " . $otp);
    
        Mail::to($request->email)->send(new OtpMail($otp));
    
        return redirect()->route('verify', ['email' => $request->email]);
    }
    
    public function verify(Request $request)
    {
        return Inertia::render('Verify', [
            'email' => $request->query('email'),
        ]);
    }
    
    public function verify_request(Request $request)
    {
        $request->validate([
            'email' => 'required|email|exists:users,email',
            'otp' => 'required|digits:6',
        ]);
    
        $cachedOtp = Cache::get('otp_' . $request->email);
    
        Log::info("OTP entered: " . $request->otp);
        Log::info("OTP stored in cache: " . ($cachedOtp ?? 'No OTP found'));
    
        if (!$cachedOtp) {
            return back()->withErrors(['otp' => 'OTP has expired. Please request a new one.']);
        }
    
        if ((string) $cachedOtp !== (string) $request->otp) {
            return back()->withErrors(['otp' => 'Invalid OTP. Please try again.']);
        }
    
        Cache::forget('otp_' . $request->email);
    
        $user = User::where('email', $request->email)->first();
        if ($user) {
            $user->email_verified_at = now();
            $user->save();
        }
    
        return redirect()->route('dashboard')->with('success', 'OTP Verified Successfully!');
    }
    

    Having set all this code, we return to the request.vue file to set it up.

    <script setup>
    import AuthenticatedLayout from '@/Layouts/AuthenticatedLayout.vue';
    import InputError from '@/Components/InputError.vue';
    import InputLabel from '@/Components/InputLabel.vue';
    import PrimaryButton from '@/Components/PrimaryButton.vue';
    import TextInput from '@/Components/TextInput.vue';
    import { Head, useForm } from '@inertiajs/vue3';
    
    const props = defineProps({
        email: {
            type: String,
            required: true,
        },
    });
    
    const form = useForm({
        email: props.email,
    });
    
    const submit = () => {
        form.post(route('send.otp.request'), {
            onSuccess: () => {
                alert("OTP has been sent to your email!");
                form.get(route('verify'), { email: form.email }); // Redirecting to OTP verification
            },
        });
    };
    </script>
    
    <template>
        <Head title="Request OTP" />
    
        <AuthenticatedLayout>
            <form @submit.prevent="submit">
                <div>
                    <InputLabel for="email" value="Email" />
    
                    <TextInput
                        id="email"
                        type="email"
                        class="mt-1 block w-full"
                        v-model="form.email"
                        required
                        autofocus
                    />
    
                    <InputError class="mt-2" :message="form.errors.email" />
                </div>
    
                <div class="mt-4 flex items-center justify-end">
                    <PrimaryButton :class="{ 'opacity-25': form.processing }" :disabled="form.processing">
                        Request OTP
                    </PrimaryButton>
                </div>
            </form>
        </AuthenticatedLayout>
    </template>
    

    Having set all this code, we return to the verify.vue to set it up:

    <script setup>
    import AuthenticatedLayout from '@/Layouts/AuthenticatedLayout.vue';
    import InputError from '@/Components/InputError.vue';
    import InputLabel from '@/Components/InputLabel.vue';
    import PrimaryButton from '@/Components/PrimaryButton.vue';
    import TextInput from '@/Components/TextInput.vue';
    import { Head, useForm, usePage } from '@inertiajs/vue3';
    
    const page = usePage();
    // Get the email from the URL query params
    const email = page.props.email || '';
    
    // Initialize form with email and OTP field
    const form = useForm({
        email: email,
        otp: '',
    });
    
    // Submit function
    const submit = () => {
        form.post(route('verify.otp.request'), {
            onSuccess: () => {
                alert("OTP verified successfully! Redirecting...");
                window.location.href = '/dashboard'; // Change to your desired redirect page
            },
            onError: () => {
                alert("Invalid OTP. Please try again.");
            },
        });
    };
    </script>
    
    <template>
        <Head title="Verify OTP" />
    
        <AuthenticatedLayout>
            <form @submit.prevent="submit">
                <div>
                    <InputLabel for="otp" value="Enter OTP" />
    
                    <TextInput
                        id="otp"
                        type="text"
                        class="mt-1 block w-full"
                        v-model="form.otp"
                        required
                    />
    
                    <InputError class="mt-2" :message="form.errors.otp" />
                </div>
    
                <div class="mt-4 flex items-center justify-end">
                    <PrimaryButton :disabled="form.processing">
                        Verify OTP
                    </PrimaryButton>
                </div>
            </form>
        </AuthenticatedLayout>
    </template>
    

    Step 4: Integrating OTP authentication into login and register workflows

    Update the login controller:

    public function store(LoginRequest $request): RedirectResponse
    {
        $request->authenticate();
    
        $request->session()->regenerate();
    
        return redirect()->intended(route('request', absolute: false));
    }
    

    Update the registration controller:

    public function store(Request $request): RedirectResponse
    {
        $request->validate([
            'name' => 'required|string|max:255',
            'email' => 'required|string|lowercase|email|max:255|unique:' . User::class,
            'password' => ['required', 'confirmed', RulesPassword::defaults()],
        ]);
    
        $user = User::create([
            'name' => $request->name,
            'email' => $request->email,
            'password' => Hash::make($request->password),
        ]);
    
        event(new Registered($user));
    
        Auth::login($user);
    
        return redirect(route('request', absolute: false));
    }
    

    Conclusion

    Implementing OTP authentication in Laravel and Vue.js enhances security for user logins and transactions. By generating, sending, and verifying OTPs, we can add an extra layer of protection against unauthorized access. This method is particularly useful for financial applications and sensitive user data.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI Ethics and Privacy: The Human Role in Responsible Tech
    Next Article APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 6, 2025
    Artificial Intelligence

    3 Questions: Visualizing research in the age of AI

    June 6, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Transfer Learning for Structured Pruning under Limited Task Data

    Development

    Google’s upcoming AI smart glasses may finally convince me to switch to a pair full-time

    News & Updates

    The best advice to bring to work in 2025

    Web Development

    The Birth of Ariadne – The Chilling AI

    Artificial Intelligence

    Highlights

    Machine Learning

    Revolutionizing Heuristic Design: Monte Carlo Tree Search Meets Large Language Models

    January 25, 2025

    Heuristic designing is a practical and indispensable tool leveraged in standard fields like artificial intelligence…

    People’s Cyber Army, APT44, and NoName057 Launch DDoS Attacks on Denmark

    July 4, 2024

    How GoDaddy built a category generation system at scale with batch inference for Amazon Bedrock

    March 16, 2025

    The best smart air purifiers of 2025: Expert tested and reviewed

    January 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.