JUG Tours with Spring Boot and React
This example app shows how to create a Spring Boot API and CRUD (create, read, update, and delete) its data with a React app.
Please read Use React and Spring Boot to Build a Simple CRUD App to see how this app was created.
Prerequisites: Java 17 and Node.js 18+
Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.
Getting Started
To install this example application, run the following commands:
git clone https://github.com/oktadev/okta-spring-boot-react-crud-example.git spring-react
cd spring-react
This will get a copy of the project installed locally.
Create an Application in Okta
Before you begin, you'll need a free Okta developer account. Install the Okta CLI and run okta register
to sign up for a new account. If you already have an account, run okta login
.
Then, run okta apps create
. Select the default app name, or change it as you see fit. Choose Web and press Enter.
Select Okta Spring Boot Starter. Accept the default Redirect URI of http://localhost:8080/login/oauth2/code/okta
and use http://localhost:3000,http://localhost:8080
for the Logout Redirect URI.
The Okta CLI will create an OIDC Web App in your Okta Org. It will add the redirect URIs you specified and grant access to the Everyone
group. You will see output like the following when it's finished:
Okta application configuration has been written to:
/path/to/app/src/main/resources/application.properties
Open src/main/resources/application.properties
to see the issuer and credentials for your app.
okta.oauth2.issuer=https://dev-133337.okta.com/oauth2/default
okta.oauth2.client-id=0oab8eb55Kb9jdMIr5d6
okta.oauth2.client-secret=NEVER-SHOW-SECRETS
NOTE: You can also use the Okta Admin Console to create your app. See Create a Spring Boot App for more information.
Run ./mvnw spring-boot:run -Pprod
and log in to your app at http://localhost:8080
.
Use Auth0 for OpenID Connect
If you'd rather use Auth0, that's possible too! First, you'll need to checkout the auth0
branch of this repository.
git clone -b auth0 https://github.com/oktadev/okta-spring-boot-react-crud-example.git spring-react
cd spring-react
Then, install the Auth0 CLI and run auth0 login
in a terminal.
Next, run auth0 apps create
and specify the appropriate URLs:
auth0 apps create \
--name "Spring Boot + React" \
--description "Spring Boot OIDC App" \
--type regular \
--callbacks http://localhost:8080/login/oauth2/code/okta \
--logout-urls http://localhost:3000,http://localhost:8080 \
--reveal-secrets
Modify your src/main/resources/application.properties
to include your Auth0 issuer, client ID, and client secret.
# make sure to include the trailing slash for the Auth0 issuer
okta.oauth2.issuer=https://<your-auth0-domain>/
okta.oauth2.issuer.client-id=<your-client-id>
okta.oauth2.issuer.client-secret=<your-client-secret>
NOTE: You can also use your Auth0 dashboard to configure your application. Just make sure to use the same URLs specified above.
Run ./mvnw spring-boot:run -Pprod
and log in to your app at http://localhost:8080
.
Links
This example uses the following open source libraries:
Help
Please post any questions as comments on the blog post, or visit our Okta Developer Forums.
License
Apache 2.0, see LICENSE.