Angular PWA with Authentication via Okta
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Failed to load latest commit information.

Spring Boot API with Angular PWA

This is an example app that shows how to add Authentication with Okta to an Angular PWA that works offline.

To see how this application was created, please read Add Authentication to Your Angular PWA on the Okta Developer blog.

You will need to have an Okta Developer account and your Okta settings configured to run this application.

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage and secure users and roles in any application.

Getting Started

To install this example application, run the following commands:

git clone
cd okta-spring-boot-angular-pwa-example

This will get a copy of the project installed locally. To install all of its dependencies and start each app, follow the instructions below.

To run the server, cd into the server folder and run:

./mvnw spring-boot:run

To run the client, cd into the client folder and run:

npm install && npm start

Create Applications in Okta

You will need to create an application in Okta to configure the Spring Boot both Angular and Spring Boot.

Log in to your Okta Developer account and navigate to Applications > Add Application. Click Single-Page App, click Next, and give the app a name you’ll remember (e.g., "Angular PWA"). Change all instances of localhost:8080 to localhost:4200 and click Done.

TIP: Add http://localhost:4200 as a Logout redirect URI so Logout functionality works in your Angular app.

Copy the client ID into your server/src/main/resources/ file. While you're in there, add a okta.oauth2.issuer property that matches your Okta domain. For example:


Replace the placeholders in client/src/app/app.component.ts to configure your Okta application settings (replacing {clientId} and {yourOktaDomain} with the values from your "Angular PWA" OIDC app).

import { JwksValidationHandler, OAuthService } from 'angular-oauth2-oidc';


  constructor(private oauthService: OAuthService) {
    this.oauthService.redirectUri = window.location.origin;
    this.oauthService.clientId = '{clientId}';
    this.oauthService.scope = 'openid profile email';
    this.oauthService.oidc = true;
    this.oauthService.issuer = 'https://{yourOktaDomain}.com/oauth2/default';
    this.oauthService.tokenValidationHandler = new JwksValidationHandler();


You'll also need to specify the url in client/src/home/home.component.ts.

const authClient = new OktaAuth({
  url: 'https://{yourOktaDomain}.com',
  issuer: 'default'

NOTE: The value of {yourOktaDomain} should be something like Make sure you don't include -admin in the value!

After making these changes, you should be able to log in with your credentials at http://localhost:4200.

You will be prompted to log in when you first load the client.

Angular Login Form

You can use Chrome Developer Tools to toggle offline in the Network tab and prove that it works offline.

Offline baby!

Deploy to the Cloud

See to see how to deploy to Cloud Foundry. See to see how to deploy to Heroku.

Lighthouse Score

You can see that this app scores 100 as a PWA using Lighthouse.

Cloud Foundry Heroku
Lighthouse on Cloud Foundry Lighthouse on Heroku


This example uses the following libraries provided by Okta:

It also uses the following library provided by Manfred Steyer:


Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email if would like to create a support ticket. You can also hit me up on Twitter @mraible.


Apache 2.0, see LICENSE.