Get Started With Spring Boot, OAuth 2.0, and Okta
Let's go from start to finish to make a Spring Boot app that uses OAuth for its authorization workflows and Okta for actual validation.
Join the DZone community and get the full member experience.
Join For FreeIf you’re building a Spring Boot application, you’ll eventually need to add user authentication. You can do this with OAuth 2.0 (henceforth: OAuth). OAuth is a standard that applications can use to provide client applications with “secure delegated access”. It works over HTTP and authorizes devices, APIs, servers, and applications with access tokens rather than credentials.
Very simply, OAuth is a protocol that supports authorization workflows. It gives you a way to ensure that a specific user has specific permission.
OAuth doesn’t validate a user’s identity — that’s taken care of by an authentication service like Okta. Authentication is when you validate a user’s identity (like asking for a username/password to log in), whereas authorization is when you check to see what permissions an existing user already has.
In this tutorial, you’ll build an OAuth client for a Spring Boot application, plus add authentication with the Okta Platform API. You can sign up for a forever-free Okta developer account here.
If you don’t want to code along, feel free to grab the source code from GitHub! You can also watch a video of this tutorial.
Get Started with Spring Cloud
Spring Cloud Security is a project from the good folks at Pivotal that “offers a set of primitives for building secure applications and services with minimum fuss”. Not only is it easy to use in platforms like Cloud Foundry, but it builds on Spring Boot, Spring Security, and OAuth. Because it builds on OAuth, it’s easy to integrate it with an authentication API like Okta’s.
The Spring Cloud Security project includes a great quickstart that will help you get started with very few lines of code.
Create a Secure Spring Boot App
Creating a Spring Boot application is dirt simple if you use the Spring CLI. It allows you to write Groovy scripts that get rid of the boilerplate Java and build file configuration. This allows you, the developer, to focus on the necessary code. Refer to the project’s official documentation for installation instructions. To install Spring CLI, I recommend using SDKMAN!:
sdk install springboot
Or Homebrew if you’re on a Mac.
brew tap pivotal/tap
brew install springboot
Create a helloWorld.groovy
file that has a Controller in it.
@Grab('spring-boot-starter-security')
@RestController
class Application {
@RequestMapping('/')
String home() {
'Hello World'
}
}
The @Grab
annotation invokes Grape to download dependencies and having Spring Security in the classpath causes its default security rules to be used. That is, protect everything, allow a user with the username user
, and generate a random password on startup for said user.
Run this app with the following command:
spring run helloGroovy.groovy
Navigate to http://localhost:8080 and you’ll be prompted to login with your browser’s basic authentication dialog. Enter user
for the username and copy/paste the generated password from your console. If you copied and pasted the password successfully, you’ll see Hello World
in your browser.
Create an Authorization Server in Okta
To start authenticating against Okta’a API, you have to first create a developer account on https://developer.okta.com. After activating your account, sign in and navigate to Security > API and click on the Add Authorization Server button.
Enter the name and Resource URI of your choosing. The names aren’t important at this time. I used the following values:
- Name: Oktamus Prime
- Resource URI: http://authenticat.is.easy/withokta
The Metadata URI you see in this screenshot will come in handy later when you need to specify accessTokenUri
and userAuthorizationUri
values.
Create an OpenID Connect App in Okta
To get a client id and secret, you need to create a new OpenID Connect (OIDC) app. Navigate to Applications > Add Application and click on the Create New App button. The application name isn’t important, you can use whatever you like.
Click Next to configure OIDC. Add http://localhost:8080
as a Redirect URI and click Finish.
The next screen should look similar to the following screenshot.
Your clientId
and clientSecret
values for this app will be just below the fold.
Create a Spring Boot OAuth Client
Create a helloOAuth.groovy
file that uses Spring Security and its OAuth2 support.
@Grab('spring-boot-starter-security')
@RestController
@EnableOAuth2Sso
class Application {
@GetMapping('/')
String home() {
'Hello World'
}
}
Adding the @EnableOAuth2Sso
annotation causes Spring Security to look for a number of properties. Create application.yml
in the same directory and specify the following key/value pairs.
security:
oauth2:
client:
# From OIDC app
clientId: # clientId
clientSecret: # clientSecret
# From Authorization Server's metadata
accessTokenUri: # token_endpoint
userAuthorizationUri: # authorization_endpoint
clientAuthenticationScheme: form
resource:
# from your Auth Server's metadata, check .well-known/openid-configuration
# if not in .well-known/oauth-authorization-server
userInfoUri: # userinfo_endpoint
preferTokenInfo: false
Start your app with spring run helloOAuth.groovy
and navigate to http://localhost:8080. You’ll be redirected to Okta, but likely see the following error.
This happens because Spring Security sends a redirect_uri
value of http://localhost:8080/login
. Navigate to your Okta developer instance and change your OIDC app to have this as a Redirect URI.
If you hit http://localhost:8080 again, this time you’ll get an error that doesn’t explain as much.
The whitelabel error page doesn’t tell you anything, but your browser’s address window does: no scopes were requested. Modify application.yml
to have a scope
property at the same level as clientAuthenticationScheme
. These are some standard OIDC scopes.
clientAuthenticationScheme: form
scope: openid profile email
Try http://localhost:8080 again and you’ll get an error that User is not assigned to the client app. Again, you’ll have to look in the address bar to see it.
Open your OIDC app in Okta and Assign People to it. Adding your own account is the easiest way to do this.
The next error you’ll see when trying to authenticate is Policy evaluation failed.
In Okta’s UI, navigate to Security > API and click on your Authorization Server’s name and Access Policies. Click Add Policy to continue.
Enter a name and description and set it to apply to all clients.
Click Create Policy to continue. Once that completes, click the Add Rule button.
Give the rule a name, accept the default values, and click the Create Rule button.
Try http://localhost:8080 again and this time it should work. If it does - congrats!
You can make one additional change to the helloOAuth.groovy
file to prove it’s really working: change the home()
method to return Hello $name
where $name
is from javax.security.Principal
.
@GetMapping('/')
String home(java.security.Principal user) {
'Hello ' + user.name
}
This should result in your app showing a result like the following.
Get the Source Code
The source code for this tutorial and the examples in it are available on GitHub.
Published at DZone with permission of Matt Raible, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.
Comments