This example shows how to build a Reactive Spring WebFlux API, secure it with OIDC, then add real-time capabilities to a React client.
Please read Build Reactive APIs with Spring WebFlux to see how this API was created. To see how to build the React app and integrate WebSockets, see Full Stack Reactive with Spring WebFlux, WebSockets, and React.
Prerequisites: Java 8, Maven, and an Okta Developer Account.
Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.
Clone this application to your local hard drive using Git.
git clone https://github.com/oktadeveloper/okta-spring-webflux-react-example.git webflux-api-example
To get both the Spring WebFlux API and the React app, you can checkout the react-app
branch.
git clone -b react-app https://github.com/oktadeveloper/okta-spring-webflux-react-example.git full-stack-reactive
You will need to create an OIDC Application in Okta to get your settings to log in.
- Log in to your developer account on developer.okta.com.
- Navigate to Applications and click on Add Application.
- Select Web and click Next.
- Give the application a name (e.g.,
Spring WebFlux API
) and add the following as Login redirect URIs:http://localhost:8080/login/oauth2/code/okta
http://localhost:3000/implicit/callback
https://oidcdebugger.com/debug
- Click Done, then edit the project and enable "Implicit (Hybrid)" as a grant type (allow ID and access tokens) and click Save.
Copy the settings from your OIDC app into reactive-web/src/main/resources/application.yml
:
oidc:
issuer-uri: https://{yourOktaDomain}/oauth2/default
client-id: {clientId}
client-secret: {clientSecret}
spring:
security:
oauth2:
client:
provider:
okta:
issuer-uri: ${oidc.issuer-uri}
registration:
okta:
client-id: ${oidc.client-id}
client-secret: ${oidc.client-secret}
scope: openid, email, profile
resourceserver:
jwt:
issuer-uri: ${oidc.issuer-uri}
After making these changes, you should be able to start the app (using ./mvnw
in the reactive-web
directory), navigate to http://localhost:8080/profiles and log in with your Okta credentials.
If you'd like to run the React client (and you've checked out the react-app
branch), you'll need to modify react-app/src/App.tsx
to specify your Okta settings.
const config = {
issuer: 'https://{yourOktaDomain}/oauth2/default',
redirect_uri: window.location.origin + '/implicit/callback',
client_id: {clientId}
};
You can start the React app by running the following commands (in the react-app
directory):
npm install
npm start
This example uses the following open source libraries:
Please post any questions as comments on the blog post, or visit our Okta Developer Forums. You can also email developers@okta.com if you'd like to create a support ticket.
Apache 2.0, see LICENSE.