Spring Boot and Spring Security in 15 Minutes
Switch branches/tags
Clone or download
Pull request Compare This branch is 3 commits ahead of moksamedia:master.
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
gradle/wrapper
src
.gitignore
LICENSE
README.md
build.gradle
gradlew
gradlew.bat
settings.gradle

README.md

Spring Boot and Spring Security in 15 Minutes

A Spring Boot + Spring Security example app with the following features:

  • Login and registration pages
  • Password reset workflows
  • Restricting access according to group membership

Please read Build a Web App with Spring Boot and Spring Security in 15 Minutes to see how this app was created.

Prerequisites: Java 8.

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.

Getting Started

To install this example application, run the following commands:

git clone https://github.com/oktadeveloper/okta-spring-simple-app-example.git
cd okta-spring-simple-app-example

This will get a copy of the project installed locally. To install all of its dependencies and start the app, run:

./gradlew bootRun

Create an Application in Okta

You will need to create an OpenID Connect Application in Okta to get your values to perform authentication.

Log in to your Okta Developer account (or sign up if you don’t have an account) and navigate to Applications > Add Application. Click Web, click Next, and give the app a name you’ll remember. Click Done and copy the clientId and clientSecret into src/main/resources/application.yml.

server:  
  port: 8080  
  
spring:  
  resources: static-locations: "classpath:/static/"  
                                   
okta:  
  oauth2: 
    issuer: https://{yourOktaDomain}/oauth2/default  
    clientId: {yourClientId}  
    clientSecret: {yourClientSecret}
    rolesClaim: groups

NOTE: The value of {yourOktaDomain} should be something like dev-123456.oktapreview. Make sure you don't include -admin in the value!

After modifying this file, restart your app and you should be able to authenticate with Okta.

Links

This example uses Okta's Spring Boot Starter.

Help

Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email developers@okta.com if you would like to create a support ticket.

License

Apache 2.0, see LICENSE.