original post @ Linguine Blog
Okta has been growing over 45% year over year since 2017, and it doesn't seem to be slowing down.
Big and small companies are using Okta for their external and internal software tools.
Okta is a user authentication management tool that helps businesses manage their employees software accounts with their company software tools.
For example, let's say I own a cat store and I use Slack, Jira, and Github.
If I hire an engineer, I'll have to create multiple accounts for that specific engineer.
And if that engineer leaves, I'll have to go through each tool and remove that person account. This is a problem.
Instead of doing all that manual work, you can integrate all those software tools to an Okta account and assign an Okta user to a software tool.
That means you can create 1 Okta user to your Okta account, and Okta will handle adding and removing an account for all your software tools that you've integrated with.
The neat part about Okta is that you can implement it to your own internal applications.
In this article I'll go over 8 easy steps to adding Okta authentication to your React application.
First step is to head over to the okta.com and create an account.
You can create a free 30 day trial account to test on. But if you have one already go to step 2.
That’s pretty easy.
You will than receive an email with your log in credentials, and a link to the log in page.
Go ahead and log in, and set your new password.
Once you’re logged in, you’ll need to head over to the application page.
You can find that under the Application menu tab when you hover over it.
There is also a shortcut link to add a new application on the right side.
But if you’re in the application page then click Add Application next.
Then click on Create New App. It should be a green button on the left hand side.
A popup will be presented, and you’ll need to add the following configuration to fit your React application.
You will than be prompted to add some basic setting configuration about your app.
For the moment you can add your current localhost and port number for for your test app.
Click Save once those are added.
In the bottom page of your Okta app you’ll find your Client ID.
Click on the right button to copy it to your clipboard.
The next step is to assign a user to your Okta app.
If a Okta user is not assigned to that app, they will get denied.
That’s okay too if you want. But at least add yourself!
Go back to the application page and click on the Assign Application button.
Select your application and the user you want to assign it too and click Next.
And click the confirmation button right after.
The last configuration that you need to do in your Okta account is to add your trusted origins.
This will make sure we can avoid any CORS issues.
Hover over the Security menu and select the API sub menu item.
The first tab you’ll see in the page is about tokens, but we want to change that to Trusted Origins tab.
And select Add Origin next.
Add the following field values onto the form and click Save.
The boring stuff has been completed. Now the coding begins.
To keep this example guide simple I’m going to use Create React App tooling to help us get quicker to the important part of this guide.
Let’s create a directory called okta-sample.
Inside our new directory, create a package.json file and add the following.
Now you may install those dependencies by running npm install.
Let’s also create a directory called public and src in the root of the project.
Inside the public directory let’s add an index.html file.
The index.html file will serve as a basic skeleton for the app.
In the src directory, all of your React code will live in there.
Inside src, create 2 files called index.js, and App.js. You’ll also need to add a pages directory inside the src directory.
Go ahead and run npm start. It should boot up a browser window pointed to localhost:3000.
And the web page should blank.
In this file we’re doing a handful of actions here.
We’re initializing the Browser router and adding Okta’s Security component.
Which allows you to supply your Okta configurations to your React app.
P.S. don’t hardcode production configurations like in this example.
The issuer property is just the base URL to your Okta page. Don’t forget to add the slash / in the end.
The redirect_uri, and client_id can be grabbed from the Okta application page.
If you’re running your app locally during this step you might see your application broken.
That’s because App.js hasn’t been created or the routes. Let’s do that next.
In this file you’ll see how will put the pieces together.
The first step is to import React, React Router DOM modules called Route, and Link.
Route is going to help us define public routes.
And we’re going to use Link to help us build an easy 2 menu item navigation.
The first link will be pointing to the home page page which is the log in page.
The second link will help you go to the admin dashboard page.
The other important part to this file is the SecureRoute component that is provided by Okta.
This component helps you do the logic whether the user is allowed to enter the pag. This is determined if the user is authenticated or not.
The last important piece to this file is the ImplicitCallback Okta React component.
This component helps handle the response after Okta tells React if the user has successfully signed in or not.
The admin dashboard will be a file in the pages directory called AdminDashboard.js.
It’s a very simple and plain functional React component.
The next file to create is for our home page. Which will display a sign in button.
In the login importing Okta’s HOC(higher order component) called withAuth.
And I’m wrapping it around the React class component LoginPage.
This will be needed because withAuth provides a
withAuth provides new property to the React component called user auth.
In the example above you can see that I’m using a method called login inside a onClick event for the button.
Inside the componentDidMount lifecycle you can see that I’m testing some of the other functionality that comes with withAuth such as checking if the user is authenticated, and getting the user information.
withAuth also provides other functionality such as:
Congratulations you’ve added Okta authentication to your React application!
Here’s the link to the source code. And if you found it interesting and helpful please give it a start!
This series of posts document a high-level process to use when planning a modern web application, from project organization, collaboration considerations and tooling choices during development, all the way through deployment and performance strategies.