This example app shows how to use Spring Boot and Angular in a singular artifact.
Make JAR, not WAR! -- Josh Long
If you want to be a kick-ass developer, you should write tests. I know it sucks and it seems like it sucks the life out of you, but it's totally worthwhile in the end. If you expect a system or example to live on the internet for more than a year, it needs automated nightly tests to prove it.
Please read Deploy Your Secure Spring Boot + Angular PWA as a Single Artifact to learn more about the app you're about to make into an awesome artifact.
Prerequisites: Java 8 and Node.js.
Note: I challenge you to install Java 11 and make it work with this example. I'll send you a free 🍺 somehow!
Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.
To install this example application, run the following commands:
git clone https://github.com/oktadeveloper/okta-spring-boot-angular-auth-code-flow-example.git spring-rocks
cd spring-rocks
This will get a copy of the project installed locally. To install all of its dependencies and start each app, follow the instructions below.
To run the server, cd into the holdings-api
directory and run:
./mvnw spring-boot:run
To run the client, cd into the crypto-pwa
directory and run:
npm install -g ionic
npm i && ionic serve
To package everything into a single JAR for deployment, run the following command in the holdings-api
directory.
./mvnw package -Pprod
The first thing you’ll need to do is add a holdings
attribute to your organization’s user profiles. Log in to the Okta Developer Console, then navigate to Users > Profile Editor. Click on Profile for the first profile in the table. You can identify it by its Okta logo. Click Add Attribute and use the following values:
- Display name:
Holdings
- Variable name:
holdings
- Description:
Cryptocurrency Holdings
You will need to create an API Token and OIDC App to get your values to perform authentication.
Log in to your Okta Developer account (or sign up if you don’t have an account) and navigate to Applications > Add Application. Click Web, click Next, give the app a name you’ll remember, and specify http://localhost:8080/login
as a login redirect URI and http://localhost:8080
as a logout redirect URI. Click Done.
For the Okta Java SDK to talk to Okta’s API, you’ll need to create an API token. The abbreviated steps are as follows:
- Log in to your Developer Console
- Navigate to API > Tokens and click Create Token
- Give your token a name, then copy its value
Open holdings-api/src/main/resources/application.yml
and add your API token as a property. While you're there, set the issuer
and clientId
to match your OIDC application.
NOTE: The value of {yourOktaDomain}
should be something like dev-123456.oktapreview.com
. Make sure you don't include -admin
in the value!
okta:
client:
orgUrl: https://{yourOktaDomain}.com
token: XXX
security:
oauth2:
client:
access-token-uri: https://{yourOktaDomain}.com/oauth2/default/v1/token
user-authorization-uri: https://{yourOktaDomain}.com/oauth2/default/v1/authorize
client-id: {yourClientId}
client-secret: {yourClientSecret}
scope: openid profile email
resource:
user-info-uri: https://{yourOktaDomain}.com/oauth2/default/v1/userinfo
This example uses the following libraries provided by Okta:
Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email developers@okta.com if would like to create a support ticket.
Apache 2.0, see LICENSE.