Skip to content
A simple CRUD app using SpringBoot and React.
JavaScript Java HTML CSS
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.mvn/wrapper
app
node_modules
src
.gitignore
README.md
mvnw
mvnw.cmd
package.json
pom.xml
yarn.lock

README.md

A simple CRUD app using SpringBoot and React.

This application was made by following this tutorial: https://developer.okta.com/blog/2018/07/19/simple-crud-react-and-spring-boot

Run Instructions

You must first have Java 8, Node.js 8 (or higher) and Yarn (or npm) installed.

Once you have cloned the project onto your machine, you can then start the server (as well as download all dependencies needed to run the application) by running:

./mvnw spring-boot:run

Then, start the client and download all frontend dependencies by doing:

yarn && yarn start

Because this application uses Okta's Identity and Access Management platform (specifically Okta's OIDC API), you must first create an Okta Developer account and then log in.

Once you have logged in, navigate to Applications, then to Add Application. Click Web, then Next, and enter an application of your choosing a name. Specify http://localhost:8080/login/oauth2/code/okta to act as a Login redirect URI. Click Done, then click Edit to edit General Settings. Add http://localhost:3000 and http://localhost:8080 as the Logout redirect URIs, then click Save.

Server Configuration

Set the issuer and copy the clientId and clientSecret into the src/main/resources/application.yml file of the application.

Note: The value of {yourOktaDomain} should look something like dev-123456.oktapreview.com. Do not include the -admin as it appears in your browser URL.

Therefore, your applications.yml should look like this:

spring:
profiles:
 active: @spring.profiles.active@
security:
 oauth2:
   client:
     registration:
       okta:
         client-id: {clientId}
         client-secret: {clientSecret}
         scope: openid email profile
     provider:
       okta:
         issuer-uri: https://{yourOktaDomain}/oauth2/default

Once you have followed the above steps, you should be able to run the application locally using your own Okta account's authentication.

You can’t perform that action at this time.