Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 643

Magic Link Authentication

What is Magic Link Authentication?

Magic Link AuthenticationA passwordless sign-in flow where the user receives a single-use URL by email or SMS that, when clicked, authenticates the session.


Magic link authentication replaces the password step with a one-time, expiring URL delivered to a channel the user already controls — usually their primary email or a verified phone number. The link encodes a short-lived signed token (often a JWT or opaque nonce) that the application validates and exchanges for a session. Slack, Notion, Substack, Vercel, and many SaaS products use magic links as their default flow because they remove password reuse and storage problems. NIST SP 800-63B classifies it as an out-of-band authenticator (AAL2) when the channel is sufficiently independent. Risks include phishing of the link, email account takeover, and aitm relays; mitigations include short TTLs, device binding, single-use tokens, and combining the link with a passkey or device trust check.

Examples

  1. 01

    Slack workspaces letting members sign in by clicking a 15-minute link sent to their work email.

  2. 02

    Vercel CLI's 'vercel login' command emailing a verification link that authenticates the terminal session.

Frequently asked questions

What is Magic Link Authentication?

A passwordless sign-in flow where the user receives a single-use URL by email or SMS that, when clicked, authenticates the session. It belongs to the Identity & Access category of cybersecurity.

What does Magic Link Authentication mean?

A passwordless sign-in flow where the user receives a single-use URL by email or SMS that, when clicked, authenticates the session.

How does Magic Link Authentication work?

Magic link authentication replaces the password step with a one-time, expiring URL delivered to a channel the user already controls — usually their primary email or a verified phone number. The link encodes a short-lived signed token (often a JWT or opaque nonce) that the application validates and exchanges for a session. Slack, Notion, Substack, Vercel, and many SaaS products use magic links as their default flow because they remove password reuse and storage problems. NIST SP 800-63B classifies it as an out-of-band authenticator (AAL2) when the channel is sufficiently independent. Risks include phishing of the link, email account takeover, and aitm relays; mitigations include short TTLs, device binding, single-use tokens, and combining the link with a passkey or device trust check.

How do you defend against Magic Link Authentication?

Defences for Magic Link Authentication typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Magic Link Authentication?

Common alternative names include: Email magic link, One-time link login, Passwordless link.

Related terms