Skip to content
Spring Boot + JPA and PostgreSQL
Java
Branch: master
Clone or download
Pull request Compare This branch is 2 commits ahead of moksamedia:master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
gradle/wrapper
src
.gitignore
LICENSE
README.md
build.gradle
gradlew
gradlew.bat
settings.gradle

README.md

Spring Boot + JPA and PostgreSQL

This example is a resource server using Spring Boot and Spring Data JPA. It also implements group-based authorization using Okta and OAuth 2.0.

Please read Build a Basic App with Spring Boot and JPA using PostgreSQL to see how this app was created.

Prerequisites: Java 8.

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.

Getting Started

To install this example application, run the following commands:

git clone https://github.com/oktadeveloper/okta-spring-boot-jpa-example.git
cd okta-spring-boot-jpa-example

This will get a copy of the project installed locally. To install all of its dependencies and start the app, run:

./gradlew bootRun

This will likely fail. You need to configure a PostgreSQL database with the following settings for everything to work out-of-the-box.

url: "jdbc:postgresql://localhost:5432/springbootjpa"
username: oktatutorial
password: abcd1234

Create an Application in Okta

You will need to create an OpenID Connect Application in Okta to get your values to perform authentication.

Log in to your Okta Developer account (or sign up if you don’t have an account) and navigate to Applications > Add Application. Click SPA, click Next, and give the app a name you’ll remember. Click Done and copy the clientId into src/main/resources/application.yml.

okta:  
  oauth2: 
    issuer: https://{yourOktaDomain}/oauth2/default  
    clientId: {yourClientId}  
    scope: openid profile email
    rolesClaim: groups   

NOTE: The value of {yourOktaDomain} should be something like dev-123456.oktapreview. Make sure you don't include -admin in the value!

After modifying this file, restart your app and you should be able to authenticate with Okta.

Links

This example uses Okta's Spring Boot Starter.

Help

Please post any questions as comments on the blog post, or visit our Okta Developer Forums.

License

Apache 2.0, see LICENSE.

You can’t perform that action at this time.