DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Related

  • Improving Backend Performance Part 1/3: Lazy Loading in Vaadin Apps
  • Authentication With Remote LDAP Server in Spring Web MVC
  • Spring Boot Pet Clinic App: A Performance Study
  • Realistic Test Data Generation for Java Apps

Trending

  • MySQL to PostgreSQL Database Migration: A Practical Case Study
  • AWS to Azure Migration: A Cloudy Journey of Challenges and Triumphs
  • How to Perform Custom Error Handling With ANTLR
  • Data Quality: A Novel Perspective for 2025
  1. DZone
  2. Coding
  3. Frameworks
  4. A Quick How-To Guide: Security with Spring Boot and Vaadin Fusion

A Quick How-To Guide: Security with Spring Boot and Vaadin Fusion

By 
Matt Raible user avatar
Matt Raible
·
Dec. 09, 20 · Interview
Likes (1)
Comment
Save
Tweet
Share
5.0K Views

Join the DZone community and get the full member experience.

Join For Free

When you build a web application, you’re working with many moving parts and pieces. Your frontend app is running business logic, the backend server deals with API calls, and it’s your job to make sure they’re secure and in sync. 

This article will teach you how to utilize Okta, Spring Boot, and Vaadin Fusion to create a full-stack web application with authentication. Specifically, this will involve: 

  • Creating a Spring Boot-based Vaadin Fusion app

  • Securing server endpoints with Okta

  • Using Okta Auth JS for logging in and securing Vaadin routes

I worked with the Head of Community at Vaadin; Marcus Hellberg, who I met some time ago on the conference circuit. Both of us come from Finland, and hold Finnish roots; my grandparents built the sauna and cabin where I grew up, deep in Montana’s remote woods. Marcus and I also share the same compassion for web technologies and Java, with their capability to build fast and efficient applications. 

You might have noticed we refer to Vaadin as Vaadin Fusion—I had always thought of Vaadin as a web network based on Google’s GWT, but Marcus clarified there are now two products, one being Vaadin Flow, and the other being Vaadin Fusion. 

Vaadin Flow refers to the classic Vaadin server-side Java API, specifically designed as a new TypeScript font framework for Java backends. Both have full-stack type safety and use the same UI components. Vaadin is no longer based on GWT—its components, instead, use web component standards. 

Prerequisites

  • Java 11+

  • Maven 3.6+

Table of Contents

  • What Is Vaadin Fusion?
  • Create a Spring Boot-based Vaadin Fusion Application
  • Secure Your Spring Boot Backend Services
    • Add the Okta Spring Boot Starter
    • Register an OpenID Connect Application
    • Configure Spring Security
    • Create a Vaadin Endpoint for Accessing Data
    • Call the Spring Boot Endpoint from Vaadin Fusion
    • Start Your Vaadin + Spring Boot App
  • Add a Vaadin Login Page and Restrict Access to Views
    • Create an Auth Service for Authentication
    • Create a Login View
    • Restrict View Access to Authenticated Users
  • Consume the Secure Endpoint from the Client
    • Create a Middleware to Add the Access Token JWT to Server Requests
    • Call the Secure Endpoint Methods
    • Add a Logout Link
  • Learn More About Vaadin and Spring Boot

You can find the full completed source code for this tutorial on GitHub, in the oktadeveloper/okta-vaadin-fusion-spring-boot-example repository.

What Is Vaadin Fusion?

Vaadin Fusion is an open-source, front-end framework designed specifically for Java backends. Fusion gives you type-safe access to your backend from your client app by auto-generating TypeScript interfaces for your server Java objects. It wraps REST calls in async TypeScript methods, so you can access your backend as easily as calling any TypeScript function.

End-to-end type checking means you catch any breaking changes at build time, not in production. Oh, and there’s auto-complete everywhere, so you can focus on coding, not reading API docs.

Views are written in TypeScript with LitElement, a lightweight, reactive component library.

Create a Spring Boot-based Vaadin Fusion Application

Begin by creating a new Vaadin Fusion app with the Vaadin starter wizard. It allows you to configure views, tech stack, and theme before downloading an app starter.

Rename the About view to "People" and change its URL to "people":


Go into the application settings and change the name to Vaadin Okta. Then, select TypeScript + HTMLfor the UI stack to get a Fusion project.



  1. Click Download, and you’ll get a zip file containing a Maven project.

  2. Open the project in your IDE.

The two important folders in the project are:

  • /frontend - This folder contains all the frontend code

  • /src/main/java - This folder includes all the backend code, which is a Spring Boot app

Start the application with the following command:

Shell
 




x


 
1
mvn


The launcher should open up the app in your default browser. If not, navigate to http://localhost:8080.

Secure Your Spring Boot Backend Services

Vaadin Fusion uses type-safe endpoints for server access. You create an endpoint by annotating a class with @Endpoint. This will export all the methods in the class and make them callable from TypeScript. Vaadin will also generate TypeScript interfaces for any data types the methods use.

Vaadin endpoints require authentication by default. You can explicitly make an endpoint class or a single method accessible to unauthenticated users by adding an @AnonymousAllowed annotation.

In this app, you want to restrict access to only authenticated users. You’ll use OpenID Connect (OIDC) and Okta to make this possible.

Add the Okta Spring Boot Starter

Add the Okta Spring Boot starter and Lombok dependencies to the <dependencies> section of your pom.xml file.

XML
 




xxxxxxxxxx
1
11


 
1
<dependency>
2
    <groupId>com.okta.spring</groupId>
3
    <artifactId>okta-spring-boot-starter</artifactId>
4
    <version>1.4.0</version>
5
</dependency>
6

          
7
<!-- Only for convenience, not required for using Vaadin or Okta -->
8
<dependency>
9
    <groupId>org.projectlombok</groupId>
10
    <artifactId>lombok</artifactId>
11
</dependency>


Make sure your IDE imports the dependencies, or re-run mvn.

Register an OpenID Connect Application

Create a free Okta developer account on developer.okta.com if you don’t already have one.

Once logged in, go to Applications > Add Application and select Single-Page App.

Configure the app settings and click Done to create the app:


  • Name: Vaadin Fusion

  • Base URIs: http://localhost:8080

  • Login redirect URIs: http://localhost:8080/callback

  • Logout redirect URIs: http://localhost:8080

  • Grant type allowed: Authorization Code

Store the issuer in src/main/resources/application.properties by adding the following property:

Properties files
 




xxxxxxxxxx
1


 
1
okta.oauth2.issuer=https://{yourOktaDomain}/oauth2/default


Configure Spring Security

Vaadin integrates with Spring Security to handle authorization. Instead of restricting access to specific routes as you would with Spring REST controllers, you need permit all traffic to /** so Vaadin can handle security.

Vaadin is configured to:

  • Serve index.html for the root path and any unmatched server route

  • Serve static assets

  • Handle authorization and cross-site request forgery (CSRF) protection in server endpoints

By default, all server endpoints require an authenticated user. You can allow anonymous access to an endpoint or a method by adding an @AnonymousAllowed annotation. You can further restrict access by adding @RolesAllowed to an endpoint or a method.

Create a new class SecurityConfiguration.java in the same package as Application.java with the following contents:

Java
 




xxxxxxxxxx
1
39


 
1
package com.example.application;
2

          
3
import com.okta.spring.boot.oauth.Okta;
4

          
5
import org.springframework.http.HttpMethod;
6
import org.springframework.security.config.annotation.web.builders.HttpSecurity;
7
import org.springframework.security.config.annotation.web.builders.WebSecurity;
8
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity;
9
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter;
10

          
11
@EnableWebSecurity
12
public class SecurityConfiguration extends WebSecurityConfigurerAdapter {
13

          
14
    @Override
15
    public void configure(WebSecurity web) throws Exception {
16
        // @formatter:off
17
        web.ignoring()
18
          .antMatchers(HttpMethod.OPTIONS, "/**")
19
          .antMatchers("/**/*.{js,html,css,webmanifest}");
20
        // @formatter:on
21
    }
22

          
23
    @Override
24
    protected void configure(HttpSecurity http) throws Exception {
25
        // @formatter:off
26
        // Vaadin handles CSRF for its endpoints
27

          
28
        http.csrf().ignoringAntMatchers("/connect/**")
29
            .and()
30
            .authorizeRequests()
31
            // allow access to everything, Vaadin will handle security
32
            .antMatchers("/**").permitAll()
33
            .and()
34
            .oauth2ResourceServer().jwt();
35
        // @formatter:on
36

          
37
        Okta.configureResourceServer401ResponseBody(http);
38
    }
39
}


Create a Vaadin Endpoint for Accessing Data

Now that you have the server set up for authenticating requests add a service you can call from the client app.

First, create a Person.java class to use as the data model in the com.example.application.views.people package.

Java
 




xxxxxxxxxx
1
11


 
1
package com.example.application.views.people;
2

          
3
import lombok.AllArgsConstructor;
4
import lombok.Data;
5

          
6
@Data
7
@AllArgsConstructor
8
public class Person {
9
    private String firstName;
10
    private String lastName;
11
}


If you aren’t using Lombok, omit the annotations and add a constructor that takes in firstName and lastName, and create getters and setters for both.

Open PeopleEndpoint.java and replace the contents with the following:

Java
 




xxxxxxxxxx
1
27


 
1
package com.example.application.views.people;
2

          
3
import com.vaadin.flow.server.connect.Endpoint;
4

          
5
import java.util.ArrayList;
6
import java.util.List;
7

          
8
@Endpoint
9
public class PeopleEndpoint {
10

          
11
    // We'll use a simple list to hold data
12
    private List<Person> people = new ArrayList<>();
13

          
14
    public PeopleEndpoint() {
15
        // Add one person so we can see that everything works
16
        people.add(new Person("Jane", "Doe"));
17
    }
18

          
19
    public List<Person> getPeople() {
20
        return people;
21
    }
22

          
23
    public Person adEclipsedPerson(Person person) {
24
        people.add(person);
25
        return person;
26
    }
27
}


Vaadin will make the getPeople() and addPerson() methods available as asynchronous TypeScript methods. It will also generate a TypeScript interface for Person, so you can access the same type-information of both on the server and in the client.

Call the Spring Boot Endpoint from Vaadin Fusion

Create a view that uses the server API. Open frontend/views/people/people-view.ts and replace its code with the following:

TypeScript
 




xxxxxxxxxx
1
83


 
1
import {
2
  LitElement,
3
  html,
4
  css,
5
  customElement,
6
  internalProperty,
7
} from 'lit-element';
8
import Person from '../../generated/com/example/application/views/people/Person';
9

          
10
import '@vaadin/vaadin-text-field';
11
import '@vaadin/vaadin-button';
12
import { Binder, field } from '@vaadin/form';
13
import PersonModel from '../../generated/com/example/application/views/people/PersonModel';
14
import { addPerson, getPeople } from '../../generated/PeopleEndpoint';
15

          
16
@customElement('people-view')
17
export class PeopleView extends LitElement {
18
  @internalProperty()
19
  private people: Person[] = [];
20
  @internalProperty()
21
  private message = '';
22

          
23
  // Manages form state, binds inputs to the model
24
  private binder = new Binder(this, PersonModel);
25

          
26
  render() {
27
    const { model } = this.binder;
28

          
29
    return html`
30
     <h1>People</h1>
31

          
32
     <div class="message">${this.message}</div>
33

          
34
     <ul>
35
       ${this.people.map(
36
      (person) => html`<li>${person.firstName} ${person.lastName}</li>`
37
    )}
38
     </ul>
39

          
40
     <h2>Add new person</h2>
41
     <div class="form">
42
       <vaadin-text-field
43
         label="First Name"
44
         ...=${field(model.firstName)}
45
       ></vaadin-text-field>
46
       <vaadin-text-field
47
         label="Last Name"
48
         ...=${field(model.lastName)}
49
       ></vaadin-text-field>
50
       <vaadin-button @click=${this.add}>Add</vaadin-button>
51
     </div>
52
   `;
53
  }
54

          
55
  async connectedCallback() {
56
    super.connectedCallback();
57
    try {
58
      this.people = await getPeople();
59
    } catch (e) {
60
      this.message = `Failed to get people: ${e.message}.`;
61
    }
62
  }
63

          
64
  async add() {
65
    try {
66
      const saved = await this.binder.submitTo(addPerson);
67
      if (saved) {
68
        this.people = [...this.people, saved];
69
        this.binder.clear();
70
      }
71
    } catch (e) {
72
      this.message = `Failed to save: ${e.message}.`;
73
    }
74
  }
75

          
76
  static styles = css`
77
   :host {
78
     display: block;
79
     padding: var(--lumo-space-m) var(--lumo-space-l);
80
   }
81
 `;
82
}


Here’s what this code does:

  • Defines two internal properties: people and message to hold the component’s state. Any time a property changes, the template will get re-rendered efficiently.

  • Initialized a Binder for handling the new-person form. It keeps track of the model value, handles validations, and submits the value to the endpoint.

  • The template:

    • Lists all people in an unordered list (<ul>)

    • Displays a form for adding new people. The form uses two Vaadin components: vaadin-text-field and vaadin-button. The fields are bound to the Binder with the help of a spread operator (…=${field(…)}). You can read more about forms in the Vaadin documentation

    • The Add button calls the add() method, which submits the form to the backend and adds the saved Person to the people array.

  • If any of the server calls fail, message gets populated to inform the user.

Start Your Vaadin + Spring Boot App

Start the application with the following command:

Shell
 




xxxxxxxxxx
1


 
1
mvn


You should now be able to launch the application and see the views. However, if you try to access the People page, you’ll get an error because you aren’t authenticated.


You need to add a login view and authenticate the user before calling any of the secure endpoints.

Add a Vaadin Login Page and Restrict Access to Views

You are going to use a custom login screen and Okta Auth JS to authenticate users. You will do this in three steps:

  1. Create a service for handling everything auth related

  2. Create a login view

  3. Restrict view access to logged-in users and redirect unauthenticated users to the login view

Create an Auth Service for Authentication

Begin by installing the Okta Auth JS library with npm:

Shell
 




xxxxxxxxxx
1


 
1
npm i @okta/okta-auth-js@4.0.3


Then, create a new file, auth.ts, in the frontend folder. This is where all the authentication magic happens.

TypeScript
 




xxxxxxxxxx
1
64


 
1
import { AccessToken, OktaAuth } from '@okta/okta-auth-js';
2

          
3
const authClient = new OktaAuth({
4
  issuer: 'https://{yourOktadomain}/oauth2/default', // use your own
5
  clientId: '{frontend app client id}', // use your own
6
  redirectUri: window.location.origin + '/callback',
7
  pkce: true
8
});
9

          
10
const isAuthenticated = async () => {
11
  // Checks if there is a current accessToken in the TokenManger.
12
  return !!(await authClient.tokenManager.get('accessToken'));
13
};
14

          
15
const signIn = async (username: string, password: string) => {
16
  const authResult = await authClient.signIn({
17
    username,
18
    password,
19
    scopes: ['openid', 'email', 'profile'],
20
  });
21

          
22
  if (authResult.status === 'SUCCESS') {
23
    authClient.token.getWithRedirect({
24
      sessionToken: authResult.sessionToken,
25
      responseType: 'id_token',
26
    });
27
  }
28
};
29

          
30
const signOut = () => authClient.signOut();
31

          
32
const handleAuthentication = async () => {
33
  if (authClient.token.isLoginRedirect()) {
34
    try {
35
      const tokenResponse = await authClient.token.parseFromUrl();
36
      const {accessToken, idToken} = tokenResponse.tokens;
37
      if (!accessToken || !idToken) return false;
38

          
39
      authClient.tokenManager.add('accessToken', accessToken);
40
      authClient.tokenManager.add('idToken', idToken);
41
      return true;
42
    } catch (err) {
43
      console.warn(`authClient.token.parseFromUrl() errored: ${err}`);
44
      return false;
45
    }
46
  }
47
  return false;
48
};
49

          
50
const getAccessToken = async () => {
51
  const token = (await authClient.tokenManager.get(
52
    'accessToken'
53
  )) as AccessToken;
54

          
55
  return token;
56
};
57

          
58
export {
59
  isAuthenticated,
60
  signIn,
61
  signOut,
62
  handleAuthentication,
63
  getAccessToken,
64
};


Here’s what auth.ts does:

  • It creates an internal instance of AuthClient configured with your info

  • It exports the following methods:

    • isAuthenticated returns a boolean indicating whether or not the user is authenticated

    • signIn takes a username and password and asks the client to authenticate. The client will redirect to the redirect URI

    • handleAuthentication reads the response from the redirect and saves the returned tokens

    • getAccessToken returns the access token for use with server calls

    • signOut signs out the user

Create a Login View

Next, create a login view so users can enter their credentials and get authenticated.

Create a new folder frontend/views/login. In that folder, create a new file login-view.ts with the following content:


TypeScript
 




x


 
1
import { customElement, html, internalProperty, LitElement } from 'lit-element';
2
import { signIn } from '../../auth';
3
import '@vaadin/vaadin-login/vaadin-login-form';
4

          
5
@customElement('login-view') (1)
6
export class LoginView extends LitElement {
7
  @internalProperty()
8
  private error = !!new URLSearchParams().get('error');
9

          
10
  render() {
11
    return html`
12
     <style>
13
       login-view {
14
         display: flex;
15
         flex-direction: column;
16
         height: 100%;
17
         align-items: center;
18
         justify-content: center;
19
       }
20
     </style>
21
     <vaadin-login-form (2)
22
       @login=${this.login} (3)
23
       ?error=${this.error}
24
       no-forgot-password
25
     ></vaadin-login-form>
26
   `;
27
  }
28

          
29
  async login(e: CustomEvent) { (4)
30
    try {
31
      await signIn(e.detail.username, e.detail.password);
32
    } catch (e) {
33
      this.error = true;
34
    }
35
  }
36

          
37
  // Render in light DOM for password managers
38
  protected createRenderRoot() {
39
    return this;
40
  }
41
}


(1) The view uses LitElement to define a new component, <login-view>.
(2) Use the <vaadin-login-form> element for capturing login information.
(3) The login-event is bound to the login method with @login=${this.login}.
(4) The login() method calls the signIn() function in the auth service, which in turn will redirect the user to the callback URL.

Restrict View Access to Authenticated Users

The final piece of the puzzle is to add an authentication guard that only allows logged-in users to access the views. Any unauthenticated users should be redirected to the login page first. You also need to define logic for capturing the callback from Okta and logging out users.

Open frontend/index.ts and replace its contents with the following:

TypeScript
 




xxxxxxxxxx
1
58


 
1
import { Commands, Context, Route, Router } from '@vaadin/router';
2

          
3
import './views/main/main-view';
4
import './views/login/login-view';
5
import './views/helloworld/hello-world-view';
6
import { handleAuthentication, isAuthenticated, signOut } from './auth';
7

          
8
const authGuard = async (context: Context, commands: Commands) => {
9
  if (!(await isAuthenticated())) {
10
    // Save requested path
11
    sessionStorage.setItem('login-redirect-path', context.pathname);
12
    return commands.redirect('/login');
13
  }
14
  return undefined;
15
};
16

          
17
const routes: Route[] = [
18
  { path: '/login', component: 'login-view' },
19
  {
20
    path: '/callback',
21
    action: async (_: Context, commands: Commands) => {
22
      if (await handleAuthentication()) {
23
        return commands.redirect(
24
          sessionStorage.getItem('login-redirect-path') || '/'
25
        );
26
      } else {
27
        return commands.redirect('/login?error');
28
      }
29
    },
30
  },
31
  {
32
    path: '/logout',
33
    action: async (_: Context, commands: Commands) => {
34
      signOut();
35
      location.reload();
36
      return commands.prevent();
37
    },
38
  },
39
  {
40
    path: '',
41
    component: 'main-view',
42
    action: authGuard, // Require a logged in user to access
43
    children: [
44
      { path: '', component: 'hello-world-view' },
45
      { path: 'hello', component: 'hello-world-view' },
46
      {
47
        path: 'people',
48
        component: 'people-view',
49
        action: async () => {
50
          await import('./views/people/people-view');
51
        },
52
      },
53
    ],
54
  },
55
];
56

          
57
export const router = new Router(document.querySelector('#outlet'));
58
router.setRoutes(routes);


Here’s what this code does:

  • authGuard is a Vaadin Router action that uses the auth service to check if a user is authenticated. If not, it will save the requested path and redirect to the login view

  • In the router configuration, you added three routes:

    • login maps to the login view component you created in the previous step

    • callback handles the return value from Okta. If the authentication was successful, it will navigate to the path the user requested before being redirected to the login page

    • logout signs out the user from the Okta Auth JS client and then destroys the Spring Security context by calling /logout on the server

  • Adds the authGuard to main-view with action: authGuard

Consume the Secure Endpoint from the Client

One last thing we need to take care of before we can access the backend is to include the access token JWT with server requests. We can do this with a middleware.

Create a Middleware to Add the Access Token JWT to Server Requests

Create a new file, connect-client.ts in the frontend folder with the following content:

TypeScript
 




xxxxxxxxxx
1
27


 
1
import {
2
  ConnectClient,
3
  MiddlewareContext,
4
  MiddlewareNext,
5
} from '@vaadin/flow-frontend/Connect';
6
import { getAccessToken } from './auth';
7

          
8
const client = new ConnectClient({
9
  prefix: 'connect',
10
  middlewares: [
11
    async function addAuthHeaderMiddleware(
12
      context: MiddlewareContext,
13
      next: MiddlewareNext
14
    ) {
15
      const token = await getAccessToken();
16
      if (token) {
17
        context.request.headers.set(
18
          'Authorization',
19
          `Bearer ${token.accessToken}`
20
        );
21
      }
22
      return next(context);
23
    },
24
  ],
25
});
26

          
27
export default client;


The middleware uses the auth service to get the access token and adds it to the outgoing request headers.

Call the Secure Endpoint Methods

You are now ready to use the application. Run the application with the following command:

Shell
 




xxxxxxxxxx
1


 
1
mvn


Once the application is up, go to http://localhost:8080, log in with the user you created.


Once you are logged in, you should be able to view and add people through the secure server endpoint.


Add a Logout Link

Finally, add a logout link so users can sign out when they’re done.

Open main-view.ts and add a link at the end of the <header> section of the template, just after the Avatar image:

HTML
 




xxxxxxxxxx
1


 
1
<header slot="navbar" theme="dark">
2
  <vaadin-drawer-toggle></vaadin-drawer-toggle>
3
  <h1>${this.getSelectedTabName(this.menuTabs)}</h1>
4
  <img src="images/user.svg" alt="Avatar" />
5
  <a href="logout" class="logout">Log out</a>
6
</header>


Add a margin to the link so that it doesn’t touch the edge of the screen in the styles section of main-view.ts:

CSS
 




xxxxxxxxxx
1
10


 
1
...
2
header h1 {
3
  font-size: var(--lumo-font-size-l);
4
  margin: 0;
5
}
6

          
7
header .logout {
8
  margin-right: 12px;
9
}
10
...


After making these changes, you should see a Log out link in the top right corner.


Now you should be able to log in, add people, and log out. Huzzah! 

Learn More About Vaadin and Spring Boot

We hope you’ve enjoyed this quick tutorial on how to integrate authentication with Okta into a Vaadin Fusion app.

Now that you have a secure app up and running, you can start exploring other features of Vaadin and Okta. Here are some helpful resources to get started:

  • Browse all Vaadin components

  • Vaadin Fusion docs

  • Okta developer docs

You can find the full completed source code for this tutorial on GitHub in our okta-vaadin-fusion-spring-boot-example repository.

If you want to know more about Spring Boot and Okta, you might find these blog posts helpful:

  • OAuth 2.0 Java Guide: Secure Your App in 5 Minutes

  • Build a CRUD Application with Kotlin and React

  • How to GraphQL in Java

  • Angular + Docker with a Big Hug from Spring Boot

  • Easy Session Sharing in Spring Boot with Spring Session and MySQL

  • Build a CRUD App with Vue.js, Spring Boot, and Kotlin

As always, if you have any questions, feel free to leave us a comment below. Don’t forget to follow us on Twitter, like us on Facebook, check us out on LinkedIn, and subscribe to our YouTube channel.

Spring Framework Vaadin Spring Boot Spring Security app application

Published at DZone with permission of Matt Raible, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Improving Backend Performance Part 1/3: Lazy Loading in Vaadin Apps
  • Authentication With Remote LDAP Server in Spring Web MVC
  • Spring Boot Pet Clinic App: A Performance Study
  • Realistic Test Data Generation for Java Apps

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!