Authentication with Spring Security 5 and Okta OIDC
Switch branches/tags
Nothing to show
Clone or download
Latest commit e2dd14b Oct 1, 2018

README.md

Spring Security 5 + Okta

An example app that shows how to use OIDC with Spring Security 5 and Okta.

Please read Get Started with Spring Security 5.0 and OIDC to see how this app was created.

Prerequisites: Java 8.

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.

Getting Started

To install this example application, run the following commands:

git clone https://github.com/oktadeveloper/okta-spring-security-5-example.git
cd okta-spring-security-5-example

This will get a copy of the project installed locally. To install all of its dependencies and start the app, run:

./mvnw spring-boot:run

Create an Application in Okta

You will need to create an OpenID Connect Application in Okta to get your values to perform authentication.

Log in to your Okta Developer account (or sign up if you don’t have an account) and navigate to Applications > Add Application. Click Web, click Next, and give the app a name you’ll remember. Click Done and copy the clientId and clientSecret into server/src/main/resources/application.yml.

spring:
  thymeleaf:
    cache: false
  security:
    oauth2:
      client:
        registration:
          okta:
            client-id: {clientId}
            client-secret: {clientSecret}
        provider:
          okta:
            authorization-uri: https://{yourOktaDomain}.com/oauth2/default/v1/authorize
            token-uri: https://{yourOktaDomain}.com/oauth2/default/v1/token
            user-info-uri: https://{yourOktaDomain}.com/oauth2/default/v1/userinfo
            jwk-set-uri: https://{yourOktaDomain}.com/oauth2/default/v1/keys

NOTE: The value of {yourOktaDomain} should be something like dev-123456.oktapreview. Make sure you don't include -admin in the value!

After modifying this file, restart your app and you'll be prompted to click on an "Okta" link to log in.

Links

This example uses Spring Security's OAuth 2.0 Login feature.

Help

Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email developers@okta.com if you would like to create a support ticket.

License

Apache 2.0, see LICENSE.