Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 4, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 4, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 4, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 4, 2025

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025

      One of Microsoft’s biggest hardware partners joins its “bold strategy, Cotton” moment over upgrading to Windows 11, suggesting everyone just buys a Copilot+ PC

      June 4, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025
      Recent

      LatAm’s First Databricks Champion at Perficient

      June 4, 2025

      Beyond AEM: How Adobe Sensei Powers the Full Enterprise Experience

      June 4, 2025

      Simplify Negative Relation Queries with Laravel’s whereDoesntHaveRelation Methods

      June 4, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025
      Recent

      Players aren’t buying Call of Duty’s “error” excuse for the ads Activision started forcing into the game’s menus recently

      June 4, 2025

      In Sam Altman’s world, the perfect AI would be “a very tiny model with superhuman reasoning capabilities” for any context

      June 4, 2025

      Sam Altman’s ouster from OpenAI was so dramatic that it’s apparently becoming a movie — Will we finally get the full story?

      June 4, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»OTP Authentication in Laravel & Vue.js for Secure Transactions

    OTP Authentication in Laravel & Vue.js for Secure Transactions

    April 20, 2025

    Introduction

    In today’s digital world, security is paramount, especially when dealing with sensitive data like user authentication and financial transactions. One of the most effective ways to enhance security is by implementing One-Time Password (OTP) authentication. This article explores how to implement OTP authentication in a Laravel backend with a Vue.js frontend, ensuring secure transactions.

    Why Use OTP Authentication?

    OTP authentication provides an extra layer of security beyond traditional username and password authentication. Some key benefits include:

    • Prevention of Unauthorized Access: Even if login credentials are compromised, an attacker cannot log in without the OTP.
    • Enhanced Security for Transactions: OTPs can be used to confirm high-value transactions, preventing fraud.
    • Temporary Validity: Since OTPs expire after a short period, they reduce the risk of reuse by attackers.

    Prerequisites

    Before getting started, ensure you have the following:

    • Laravel 8 or later installed
    • Vue.js configured in your project
    • A mail or SMS service provider for sending OTPs (e.g., Twilio, Mailtrap)
    • Basic understanding of Laravel and Vue.js

    In this guide, we’ll implement OTP authentication in a Laravel (backend) and Vue.js (frontend) application. We’ll cover:

    • Setting up Laravel and Vue (frontend) from scratch
    • Setting up OTP generation and validation in Laravel
    • Creating a Vue.js component for OTP input
    • Integrating OTP authentication into login workflows
    • Enhancing security with best practices

    By the end, you’ll have a fully functional OTP authentication system ready to enhance the security of your fintech or web application.

    Setting Up Laravel for OTP Authentication

    Step 1: Install Laravel and Required Packages

    If you haven’t already set up a Laravel project, create a new one:

    composer create-project "laravel/laravel:^10.0" example-app
    

    Next, install the Laravel Breeze package for frontend scaffolding:

    composer require laravel/breeze --dev
    

    After composer has finished installing, run the following command to select the framework you want to use—the Vue configuration:

    php artisan breeze:install
    

    You’ll see a prompt with the available stacks:

    Which Breeze stack would you like to install?
    - Vue with Inertia   
    Would you like any optional features?
    - None   
    Which testing framework do you prefer? 
    - PHPUnit
    

    Breeze will automatically install the necessary packages for your Laravel Vue project. You should see:

    INFO Breeze scaffolding installed successfully.
    

    Now run the npm command to build your frontend assets:

    npm run dev
    

    Then, open another terminal and launch your Laravel app:

    php artisan serve
    

    Step 2: Setting up OTP generation and validation in Laravel

    We’ll use a mail testing platform called Mailtrap to send and receive mail locally. If you don’t have a mail testing service set up, sign up at Mailtrap to get your SMTP credentials and add them to your .env file:

    MAIL_MAILER=smtp
    MAIL_HOST=sandbox.smtp.mailtrap.io
    MAIL_PORT=2525
    MAIL_USERNAME=1780944422200a
    MAIL_PASSWORD=a8250ee453323b
    MAIL_ENCRYPTION=tls
    MAIL_FROM_ADDRESS=hello@example.com
    MAIL_FROM_NAME="${APP_NAME}"
    

    To send OTPs to users, we’ll use Laravel’s built-in mail services. Create a mail class and controller:

    php artisan make:mail OtpMail
    php artisan make:controller OtpController
    

    Then modify the OtpMail class:

    <?php
    
    namespace AppMail;
    
    use IlluminateBusQueueable;
    use IlluminateContractsQueueShouldQueue;
    use IlluminateMailMailable;
    use IlluminateMailMailablesContent;
    use IlluminateMailMailablesEnvelope;
    use IlluminateQueueSerializesModels;
    
    class OtpMail extends Mailable
    {
        use Queueable, SerializesModels;
    
        public $otp;
    
        /**
         * Create a new message instance.
         */
        public function __construct($otp)
        {
            $this->otp = $otp;
        }
    
        /**
         * Build the email message.
         */
        public function build()
        {
            return $this->subject('Your OTP Code')
                ->view('emails.otp')
                ->with(['otp' => $this->otp]);
        }
    
        /**
         * Get the message envelope.
         */
        public function envelope(): Envelope
        {
            return new Envelope(
                subject: 'OTP Mail',
            );
        }
    }
    

    Create a Blade view in resources/views/emails/otp.blade.php:

    <!DOCTYPE html>
    <html>
        <head>
            <title>Your OTP Code</title>
        </head>
        <body>
            <p>Hello,</p>
            <p>Your One-Time Password (OTP) is: <strong>{{ $otp }}</strong></p>
            <p>This code is valid for 10 minutes. Do not share it with anyone.</p>
            <p>Thank you!</p>
        </body>
    </html>
    

    Step 3: Creating a Vue.js component for OTP input

    Normally, after login or registration, users are redirected to the dashboard. In this tutorial, we add an extra security step that validates users with an OTP before granting dashboard access.

    Create two Vue files:

    • Request.vue: requests the OTP
    • Verify.vue: inputs the OTP for verification

    Now we create the routes for the purpose of return the View and the functionality of creating OTP codes, storing OTP codes, sending OTP codes through the mail class, we head to our web.php file:

    Route::middleware('auth')->group(function () {
        Route::get('/request', [OtpController::class, 'create'])->name('request');
        Route::post('/store-request', [OtpController::class, 'store'])->name('send.otp.request');
    
        Route::get('/verify', [OtpController::class, 'verify'])->name('verify');
        Route::post('/verify-request', [OtpController::class, 'verify_request'])->name('verify.otp.request');
    });
    

    Putting all of this code in the OTP controller returns the View for our request.vue and verify.vue file and the functionality of creating OTP codes, storing OTP codes, sending OTP codes through the mail class and verifying OTP codes, we head to our web.php file to set up the routes.

    public function create(Request $request)
    {
        return Inertia::render('Request', [
            'email' => $request->query('email', ''),
        ]);
    }
    
    public function store(Request $request)
    {
        $request->validate([
            'email' => 'required|email|exists:users,email',
        ]);
    
        $otp = rand(100000, 999999);
    
        Cache::put('otp_' . $request->email, $otp, now()->addMinutes(10));
    
        Log::info("OTP generated for " . $request->email . ": " . $otp);
    
        Mail::to($request->email)->send(new OtpMail($otp));
    
        return redirect()->route('verify', ['email' => $request->email]);
    }
    
    public function verify(Request $request)
    {
        return Inertia::render('Verify', [
            'email' => $request->query('email'),
        ]);
    }
    
    public function verify_request(Request $request)
    {
        $request->validate([
            'email' => 'required|email|exists:users,email',
            'otp' => 'required|digits:6',
        ]);
    
        $cachedOtp = Cache::get('otp_' . $request->email);
    
        Log::info("OTP entered: " . $request->otp);
        Log::info("OTP stored in cache: " . ($cachedOtp ?? 'No OTP found'));
    
        if (!$cachedOtp) {
            return back()->withErrors(['otp' => 'OTP has expired. Please request a new one.']);
        }
    
        if ((string) $cachedOtp !== (string) $request->otp) {
            return back()->withErrors(['otp' => 'Invalid OTP. Please try again.']);
        }
    
        Cache::forget('otp_' . $request->email);
    
        $user = User::where('email', $request->email)->first();
        if ($user) {
            $user->email_verified_at = now();
            $user->save();
        }
    
        return redirect()->route('dashboard')->with('success', 'OTP Verified Successfully!');
    }
    

    Having set all this code, we return to the request.vue file to set it up.

    <script setup>
    import AuthenticatedLayout from '@/Layouts/AuthenticatedLayout.vue';
    import InputError from '@/Components/InputError.vue';
    import InputLabel from '@/Components/InputLabel.vue';
    import PrimaryButton from '@/Components/PrimaryButton.vue';
    import TextInput from '@/Components/TextInput.vue';
    import { Head, useForm } from '@inertiajs/vue3';
    
    const props = defineProps({
        email: {
            type: String,
            required: true,
        },
    });
    
    const form = useForm({
        email: props.email,
    });
    
    const submit = () => {
        form.post(route('send.otp.request'), {
            onSuccess: () => {
                alert("OTP has been sent to your email!");
                form.get(route('verify'), { email: form.email }); // Redirecting to OTP verification
            },
        });
    };
    </script>
    
    <template>
        <Head title="Request OTP" />
    
        <AuthenticatedLayout>
            <form @submit.prevent="submit">
                <div>
                    <InputLabel for="email" value="Email" />
    
                    <TextInput
                        id="email"
                        type="email"
                        class="mt-1 block w-full"
                        v-model="form.email"
                        required
                        autofocus
                    />
    
                    <InputError class="mt-2" :message="form.errors.email" />
                </div>
    
                <div class="mt-4 flex items-center justify-end">
                    <PrimaryButton :class="{ 'opacity-25': form.processing }" :disabled="form.processing">
                        Request OTP
                    </PrimaryButton>
                </div>
            </form>
        </AuthenticatedLayout>
    </template>
    

    Having set all this code, we return to the verify.vue to set it up:

    <script setup>
    import AuthenticatedLayout from '@/Layouts/AuthenticatedLayout.vue';
    import InputError from '@/Components/InputError.vue';
    import InputLabel from '@/Components/InputLabel.vue';
    import PrimaryButton from '@/Components/PrimaryButton.vue';
    import TextInput from '@/Components/TextInput.vue';
    import { Head, useForm, usePage } from '@inertiajs/vue3';
    
    const page = usePage();
    // Get the email from the URL query params
    const email = page.props.email || '';
    
    // Initialize form with email and OTP field
    const form = useForm({
        email: email,
        otp: '',
    });
    
    // Submit function
    const submit = () => {
        form.post(route('verify.otp.request'), {
            onSuccess: () => {
                alert("OTP verified successfully! Redirecting...");
                window.location.href = '/dashboard'; // Change to your desired redirect page
            },
            onError: () => {
                alert("Invalid OTP. Please try again.");
            },
        });
    };
    </script>
    
    <template>
        <Head title="Verify OTP" />
    
        <AuthenticatedLayout>
            <form @submit.prevent="submit">
                <div>
                    <InputLabel for="otp" value="Enter OTP" />
    
                    <TextInput
                        id="otp"
                        type="text"
                        class="mt-1 block w-full"
                        v-model="form.otp"
                        required
                    />
    
                    <InputError class="mt-2" :message="form.errors.otp" />
                </div>
    
                <div class="mt-4 flex items-center justify-end">
                    <PrimaryButton :disabled="form.processing">
                        Verify OTP
                    </PrimaryButton>
                </div>
            </form>
        </AuthenticatedLayout>
    </template>
    

    Step 4: Integrating OTP authentication into login and register workflows

    Update the login controller:

    public function store(LoginRequest $request): RedirectResponse
    {
        $request->authenticate();
    
        $request->session()->regenerate();
    
        return redirect()->intended(route('request', absolute: false));
    }
    

    Update the registration controller:

    public function store(Request $request): RedirectResponse
    {
        $request->validate([
            'name' => 'required|string|max:255',
            'email' => 'required|string|lowercase|email|max:255|unique:' . User::class,
            'password' => ['required', 'confirmed', RulesPassword::defaults()],
        ]);
    
        $user = User::create([
            'name' => $request->name,
            'email' => $request->email,
            'password' => Hash::make($request->password),
        ]);
    
        event(new Registered($user));
    
        Auth::login($user);
    
        return redirect(route('request', absolute: false));
    }
    

    Conclusion

    Implementing OTP authentication in Laravel and Vue.js enhances security for user logins and transactions. By generating, sending, and verifying OTPs, we can add an extra layer of protection against unauthorized access. This method is particularly useful for financial applications and sensitive user data.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleAI Ethics and Privacy: The Human Role in Responsible Tech
    Next Article APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

    Related Posts

    Security

    HPE StoreOnce Faces Critical CVE-2025-37093 Vulnerability — Urges Immediate Patch Upgrade

    June 4, 2025
    Security

    The Bitter End: Unraveling Eight Years of Espionage Antics—Part One

    June 4, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    All You Need to Know about the Metaverse

    Development

    Critical Cisco IOS XE Vulnerability Allows Arbitrary File Upload – PoC Released

    Security

    The Elder Scrolls 4: Oblivion Remastered — what’s new and different compared to the original, and why is it better?

    News & Updates

    Blykalla and Höganäs partner to advance Blykalla’s SEALER technology

    News & Updates

    Highlights

    Machine Learning

    This AI Paper Introduces R1-Onevision: A Cross-Modal Formalization Model for Advancing Multimodal Reasoning and Structured Visual Interpretation

    March 18, 2025

    Multimodal reasoning is an evolving field that integrates visual and textual data to enhance machine…

    One of the best Ring cameras I’ve tested is 50% off for a limited time

    January 29, 2025

    BeyondTrust PRA Vulnerability (CVE-2025-0217) Enables Session Hijacking via Authentication Bypass

    May 5, 2025

    Beginner’s guide to GitHub: Uploading files and folders to GitHub

    July 8, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.