Skip to content

Commit 26d37d4

Browse files
cavazosjoejcavazos
andauthored
Update README.md to reference Integrator accounts. (#130)
* Update README.md to reference Integrator accounts. * Edit steps for correctness. * Edit origin port for correctness. * Update steps for cloning the repo and modifying the config file. --------- Co-authored-by: jcavazos <jcavazos@itpops.com>
1 parent 8d748b4 commit 26d37d4

File tree

1 file changed

+30
-9
lines changed

1 file changed

+30
-9
lines changed

README.md

Lines changed: 30 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -9,23 +9,44 @@ It also shows how to return the user's information from an API using an OAuth 2.
99
Before running this sample, you will need the following:
1010

1111
* [Java 17+](https://sdkman.io/jdks)
12-
* [The Okta CLI Tool](https://github.com/okta/okta-cli/#installation)
13-
* An Okta Developer Account, create one using `okta register`, or configure an existing one with `okta login`
12+
* An Okta Integrator Free Plan account. To get one, sign up for an [Integrator account](https://developer.okta.com/login). Once you have an account, sign in to your [Integrator account](https://developer.okta.com/login). Next, in the Admin Console:
13+
14+
1. Go to **Applications > Applications**
15+
2. Click **Create App Integration**
16+
3. Select **OIDC - OpenID Connect** as the sign-in method
17+
4. Select **Web Application** as the application type, then click **Next**
18+
5. Enter an app integration name
19+
6. Configure the redirect URIs:
20+
- Accept the default redirect URI values:
21+
- **Sign-in redirect URIs:** `http://localhost:8080/login/oauth2/code/okta`
22+
- **Sign-out redirect URIs:** `http://localhost:8080`
23+
7. In the **Controlled access** section, select the appropriate access level
24+
8. Click **Save**
25+
26+
Creating an OIDC Web App manually in the Admin Console configures your Okta Org with the application settings. You may also need to configure trusted origins for `http://localhost:8080` in **Security > API > Trusted Origins**.
1427

1528
## Get the Code
1629

17-
Grab and configure this project using `okta start spring-boot`.
18-
19-
> **NOTE**: If you'd like to use WebFlux instead of Spring MVC, use `okta start spring-boot --branch webflux`.
20-
21-
You can also clone this repo and run `okta start` in it.
22-
2330
```bash
2431
git clone https://github.com/okta-samples/okta-spring-boot-sample.git
2532
cd okta-spring-boot-sample
26-
okta start
2733
```
2834

35+
Update your config file at `.okta.env` with the values from your application's configuration:
36+
37+
```text
38+
ISSUER=https://dev-133337.okta.com
39+
CLIENT_ID=0oab8eb55Kb9jdMIr5d6
40+
CLIENT_SECRET=NEVER-SHOW-SECRETS
41+
```
42+
43+
### Where are my new app's credentials?
44+
45+
After creating the app, you can find the configuration details on the app’s **General** tab:
46+
- **Client ID:** Found in the **Client Credentials** section
47+
- **Client Secret:** Click **Show** in the **Client Credentials** section to reveal
48+
- **Issuer:** Found in the **Issuer URI** field for the authorization server that appears by selecting **Security > API** from the navigation pane.
49+
2950
## Enable Refresh Token
3051

3152
Manually enable Refresh Token on your Okta application to avoid third-party cookies. Sign in to your Okta Developer Edition account. Press the **Admin Console** button to navigate to the Okta Admin Console. In the sidenav, navigate to **Applications** > **Applications** and find the Okta application for this project named `okta-spring-boot-sample`. Edit the application's **General Setting** to enable the **Refresh Token** checkbox. **Save** your changes.

0 commit comments

Comments
 (0)