Basic CRUD App with Angular 5.0 and Spring Boot 2.0
This example app shows how to build a basic CRUD app with Spring Boot 2.0, Spring Data, and Angular 5.0.
Please read Build a Basic CRUD App with Angular 5.0 and Spring Boot 2.0 to see how this app was created.
Prerequisites: Java 8 and Node.js.
Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage and secure users and roles in any application.
Getting Started
To install this example application, run the following commands:
git clone https://github.com/oktadeveloper/okta-spring-boot-2-angular-5-example.git
cd okta-spring-boot-2-angular-5-example
This will get a copy of the project installed locally. To install all of its dependencies and start each app, follow the instructions below.
To run the server, cd into the server
folder and run:
./mvnw spring-boot:run
To run the client, cd into the client
folder and run:
npm install && npm start
Create an OIDC App in Okta
You will need to create an OIDC App in Okta to get your values to perform authentication.
Log in to your Okta Developer account (or sign up if you donβt have an account) and navigate to Applications > Add Application. Click Single-Page App, click Next, and give the app a name youβll remember. Change all instances of localhost:8080
to localhost:4200
and click Done.
Server Configuration
Set your domain and copy the clientId
into server/src/main/resources/application.yml
.
NOTE: The value of {yourOktaDomain}
should be something like dev-123456.oktapreview
. Make sure you don't include -admin
in the value!
security:
oauth2:
client:
access-token-uri: https://{yourOktaDomain}.com/oauth2/default/v1/token
user-authorization-uri: https://{yourOktaDomain}.com/oauth2/default/v1/authorize
client-id: {clientId}
scope: openid profile email
resource:
user-info-uri: https://{yourOktaDomain}.com/oauth2/default/v1/userinfo
token-info-uri: https://{yourOktaDomain}.com/oauth2/default/v1/introspect
prefer-token-info: false
Client Configuration
For the client, set the issuer
and copy the clientId
into client/src/app/app.module.ts
.
const config = {
issuer: 'https://{yourOktaDomain}.com/oauth2/default',
redirectUri: window.location.origin + '/implicit/callback',
clientId: '{clientId}'
};
Links
This example uses the following open source libraries:
Help
Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email [email protected] if would like to create a support ticket.
License
Apache 2.0, see LICENSE.