Skip to content

oktadev/okta-spring-boot-angular-auth-code-flow-example

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Spring Boot, Angular, and OAuth's 🥇 Standard: Authorization Code Flow!

This example app shows how to use Spring Boot and Angular in a singular artifact.

Make JAR, not WAR! -- Josh Long

If you want to be a kick-ass developer, you should write tests. I know it sucks and it seems like it sucks the life out of you, but it's totally worthwhile in the end. If you expect a system or example to live on the internet for more than a year, it needs automated nightly tests to prove it.

Please read The Hitchhiker's Guide to Testing Spring Boot APIs and Angular Components to learn more about the app you're about to make into an awesome artifact.

Prerequisites: Java 8 and Node.js.

Note: I challenge you to install Java 11 and make it work with this example. I'll send you a free 🍺 somehow!

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.

Getting Started

To install this example application, run the following commands:

git clone https://github.com/oktadeveloper/okta-spring-boot-angular-auth-code-flow-example.git spring-rocks
cd spring-rocks

This will get a copy of the project installed locally. To install all of its dependencies and start each app, follow the instructions below.

To run the server, cd into the holdings-api folder and run:

./mvnw spring-boot:run

To run the client, cd into the crypto-pwa folder and run:

npm install -g ionic
npm i && ionic serve

Setup Okta

The first thing you’ll need to do is add a holdings attribute to your organization’s user profiles. Log in to the Okta Developer Console, then navigate to Users > Profile Editor. Click on Profile for the first profile in the table. You can identify it by its Okta logo. Click Add Attribute and use the following values:

  • Display name: Holdings
  • Variable name: holdings
  • Description: Cryptocurrency Holdings

You will need to create an API Token and OIDC App to get your values to perform authentication.

Log in to your Okta Developer account (or sign up if you don’t have an account) and navigate to Applications > Add Application. Click Single-Page App, click Next, and give the app a name you’ll remember. Click Done.

For the Okta Java SDK to talk to Okta’s API, you’ll need to create an API token. The abbreviated steps are as follows:

  1. Log in to your Developer Console
  2. Navigate to API > Tokens and click Create Token
  3. Give your token a name, then copy its value

Okta App Configuration

Open holdings-api/src/main/resources/application.properties and add your API token as a property. While you're there, set the issuer and clientId to match your OIDC application.

NOTE: The value of {yourOktaDomain} should be something like dev-123456.oktapreview.com. Make sure you don't include -admin in the value!

okta.oauth2.orgUrl=https://{yourOktaDomain}.com
okta.oauth2.issuer=https://{yourOktaDomain}.com/oauth2/default
okta.oauth2.clientId={yourClientId}
okta.client.token=XXX

Links

This example uses the following libraries provided by Okta:

Help

Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email [email protected] if would like to create a support ticket.

License

Apache 2.0, see LICENSE.