Package Exports
- @okta/okta-angular
- @okta/okta-angular/dist/okta/models/okta.config
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (@okta/okta-angular) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
Okta Angular SDK
An Angular (4+) wrapper around Okta Auth JS, that builds on top of Okta's OpenID Connect API.
This library currently supports:
Getting Started
- If you do not already have a Developer Edition Account, you can create one at https://developer.okta.com/signup/.
- An Okta Application, configured for Singe-Page App (SPA) mode. This is done from the Okta Developer Console and you can find instructions here. When following the wizard, use the default properties. They are are designed to work with our sample applications.
Helpful Links
- Angular Quickstart
- If you don't have an Angular app, or are new to Angular, please start with this guide. It will walk you through the creation of an Angular app, creating routes, and other application development essentials.
- Okta Sample Application
- A fully functional sample application.
- Okta Angular Quickstart
- Helpful resource for integrating an existing Angular application into Okta.
Installation
This library is available through npm. To install it, simply add it to your project:
npm install --save @okta/okta-angularUsage
okta-angular works directly with @angular/router and provides the additional components and services:
OktaAuthModule- Allows you to supply your OpenID Connect client configuration.OktaAuthGuard- A navigation guard using CanActivate to grant access to a page only after successful authentication.OktaCallbackComponent- Handles the implicit flow callback by parsing tokens from the URL and storing them automatically.OktaLoginRedirectComponent- Redirects users to the Okta Hosted Login Page for authentication.OktaAuthService- Highest-level service containing theokta-angularpublic methods.
OktaAuthModule
The OktaAuthModule is the initializer for your OpenID Connect client configuration. It accepts the following properties:
issuer(required): The OpenID ConnectissuerclientId(required): The OpenID Connectclient_idredirectUri(required): Where the callback is hostedscope(optional): Reserved for custom claims to be returned in the tokensresponseType(optional): Desired token grant typesonAuthRequired(optional): Accepts a callback to make a decision when authentication is required. If not supplied,okta-angularwill redirect directly to Okta for authentication.
// myApp.module.ts
import {
OktaAuthModule
} from '@okta/okta-angular';
const oktaConfig = {
issuer: 'https://{yourOktaDomain}.com/oauth2/default',
clientId: '{clientId}',
redirectUri: 'http://localhost:{port}/implicit/callback'
}
const appRoutes: Routes = [
...
]
@NgModule({
imports: [
...
OktaAuthModule.initAuth(oktaConfig)
],
})
export class MyAppModule { }OktaAuthGuard
Routes are protected by the OktaAuthGuard, which verifies there is a valid accessToken stored. To ensure the user has been authenticated before accessing your route, add the canActivate guard to one of your routes:
// myApp.module.ts
import {
OktaAuthGuard,
...
} from '@okta/okta-angular';
const appRoutes: Routes = [
{
path: 'protected',
component: MyProtectedComponent,
canActivate: [ OktaAuthGuard ]
},
...
]If a user does not have a valid session, they will be redirected to the Okta Login Page for authentication. Once authenticated, they will be redirected back to your application's protected page.
OktaCallbackComponent
In order to handle the redirect back from Okta, you need to capture the token values from the URL. You'll use /implicit/callback as the callback URL, and specify the default OktaCallbackComponent and declare it in your NgModule.
// myApp.module.ts
import {
OktaCallbackComponent,
...
} from '@okta/okta-angular';
const appRoutes: Routes = [
{
path: 'implicit/callback',
component: OktaCallbackComponent
},
...
]
@NgModule({
...
declarations: [
...
OktaCallbackComponent
]
})OktaLoginRedirectComponent
By default, the OktaLoginRedirect component redirects users to your Okta organization for login. Simply import and add it to your appRoutes to offset authentication to Okta entirely:
// myApp.module.ts
import {
OktaLoginRedirectComponent,
...
} from '@okta/okta-angular';
const appRoutes: Routes = [
{
path: 'login',
component: OktaLoginRedirectComponent
},
...
]Using a custom login-page
The okta-angular SDK supports the session token redirect flow for custom login pages. For more information, see the basic Okta Sign-in Widget functionality.
To handle the session-token redirect flow, you can modify the unauthentication callback functionality by adding a data attribute directly to your Route:
// myApp.module.ts
import {
OktaAuthGuard,
...
} from '@okta/okta-angular';
export function onAuthRequired({oktaAuth, router}) {
// Redirect the user to your custom login page
router.navigate(['/custom-login']);
}
const appRoutes: Routes = [
...
{
path: 'protected',
component: MyProtectedComponent,
canActivate: [ OktaAuthGuard ],
data: {
onAuthRequired: onAuthRequired
}
}
]Alternatively, set this behavior globally by adding it to your configuration object:
const oktaConfig = {
issuer: environment.ISSUER,
...
onAuthRequired: onAuthRequired
};OktaAuthService
In your components, your can take advantage of all of okta-angular's features by importing the OktaAuthService. The example below shows connecting two buttons to handle login and logout:
// sample.component.ts
import { OktaAuthService } from '@okta/okta-angular';
@Component({
selector: 'app-component',
template: `
<button *ngIf="!isAuthenticated" (click)="login()">Login</button>
<button *ngIf="isAuthenticated" (click)="logout()">Logout</button>
<router-outlet></router-outlet>
`,
})
export class MyComponent {
isAuthenticated: boolean;
constructor(public oktaAuth: OktaAuthService) {
// get authentication state for immediate use
await this.isAuthenticated = this.oktaAuth.isAuthenticated();
// subscribe to authentication state changes
this.oktaAuth.$authenticatedState.subscribe(
(isAuthenticated: boolean) => this.isAuthenticated = isAuthenticated
);
}
login() {
this.oktaAuth.loginRedirect('/profile');
}
logout() {
this.oktaAuth.logout('/');
}
}oktaAuth.loginRedirect(fromUri?, additionalParams?)
Performs a full page redirect to Okta based on the initial configuration. This method accepts a fromUri parameter to push the user to after successful authentication.
The optional parameter additionalParams is mapped to the AuthJS OpenID Connect Options. This will override any existing configuration. As an example, if you have an Okta sessionToken, you can bypass the full-page redirect by passing in this token. This is recommended when using the Okta Sign-In Widget. Simply pass in a sessionToken into the loginRedirect method follows:
this.oktaAuth.loginRedirect('/profile', {
sessionToken: /* sessionToken */
})Note: For information on obtaining a
sessionTokenusing the Okta Sign-In Widget, please see therenderEl()example.
oktaAuth.isAuthenticated()
Returns a promise that resolves true if there is a valid access token or ID token.
oktaAuth.$authenticationState
An observable that returns true/false when the authenticate state changes. This will happen after a successful login via oktaAuth.handleAuthentication() or logout via oktaAuth.logout().
oktaAuth.getUser()
Returns a promise that will resolve with the result of the OpenID Connect /userinfo endpoint if an access token is provided, or returns the claims of the ID token if no access token is available. The returned claims depend on the requested response type, requested scope, and authorization server policies. For more information see documentation for the UserInfo endpoint, ID Token Claims, and Customizing Your Authorization Server.
oktaAuth.getAccessToken() Promise<string>
Returns a promise that returns the access token string from storage (if it exists).
oktaAuth.getIdToken() Promise<string>
Returns a promise that returns the ID token string from storage (if it exists).
oktaAuth.handleAuthentication()
Parses the tokens returned as hash fragments in the OAuth 2.0 Redirect URI, then redirects to the URL specified when calling loginRedirect. Returns a promise that will be resolved when complete.
oktaAuth.logout(uri?)
Terminates the user's session in Okta and clears all stored tokens. Accepts an optional uri parameter to push the user to after logout.
oktaAuth.setFromUri(uri, queryParams)
Used to capture the current URL state before a redirect occurs. Used primarily for custom canActivate navigation guards.
oktaAuth.getFromUri()
Returns the stored URI and query parameters stored when the OktaAuthGuard and/or setFromUri was used.
Development
- Clone the repo:
git clone git@github.com:okta/okta-oidc-js.git
- Navigate into the
okta-angularpackage:cd packages/okta-angular
- Install dependencies:
- Navigate into the sample and install all
@angulardependencies cd test/e2e/harness && npm install
- Navigate into the sample and install all
- Make your changes to
okta-angular/src/
Commands
| Command | Description |
|---|---|
npm start |
Start the sample app using the SDK |
npm test |
Run integration tests |
npm run lint |
Run eslint linting tests |
npm run docs |
Generate typedocs |