curl --request POST \
--url https://api.mnemom.ai/v1/auth/passkey/verify-auth \
--header 'Content-Type: application/json' \
--data '
{
"response": {
"id": "<string>",
"rawId": "<string>",
"type": "public-key",
"response": {},
"clientExtensionResults": {},
"authenticatorAttachment": "<string>"
}
}
'{
"user": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"email": "jsmith@example.com",
"app_metadata": {},
"user_metadata": {}
}
}Unauthenticated. Consumes the challenge issued by /auth/passkey/challenge, verifies the assertion via @simplewebauthn/server, mints Supabase tokens via admin.generateLink(magiclink) for the resolved user (same pattern T3-2c uses for SSO identity linking), and issues mnemom_session with auth_method: 'passkey'. Counter is enforced monotonically — a decrement rejects the assertion.
curl --request POST \
--url https://api.mnemom.ai/v1/auth/passkey/verify-auth \
--header 'Content-Type: application/json' \
--data '
{
"response": {
"id": "<string>",
"rawId": "<string>",
"type": "public-key",
"response": {},
"clientExtensionResults": {},
"authenticatorAttachment": "<string>"
}
}
'{
"user": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"email": "jsmith@example.com",
"app_metadata": {},
"user_metadata": {}
}
}