There’s a lot going on in the Java ecosystem lately. Now that major Java versions are released every six months, it can be difficult to keep up. Personally, I develop the majority of my Java applications using Spring Boot. Because of this, I was stuck on Java 8 until Spring Boot 2.1 was released last October.

Spring Boot 2.1 added Java 11 support, along with performance improvements, a new metrics implementation, new actuator endpoints, and Spring Security’s first-class OIDC support.

I was a web developer years before I became a Java developer. I’ve been developing Java for 20 years, so that’s saying a lot! If you’re a Java developer, chances are you’re baffled by the pace of change in the JavaScript world. If you think Java is hard to keep up with, try keeping up with JavaScript and its ecosystem! The good news is there’s an excellent way to keep up with both: just use JHipster.

JHipster 6 uses Spring Boot 2.1 for its backend API, which means you can use Java 11+ to develop your JHipster apps!

How Does JHipster Make Java and JavaScript Development Easier?

JHipster is one of my favorite open source projects on the planet. It’s a development platform to generate, develop, and deploy Spring Boot + Angular applications. In addition, it supports React, Vue, and creating microservice architectures with Netflix OSS, the Elastic Stack, and Docker.

Java developers tend to dislike JavaScript, but many are OK with TypeScript. Guess what? JHipster uses TypeScript for all its UI framework implementations!

JHipster makes Java and JavaScript development easier by configuring everything for you and using the latest versions of its underlying frameworks. Want to upgrade your app to use the latest versions? Simply run jhipster upgrade.

Install Java 11 or Java 12

Before you worry about installing JHipster, install Java 11. I recommend using SDKMAN! for this task. If you don’t have it installed, it’s just a command away:

curl -s "" | bash

Once you have it installed, you can see all the Java 11 versions available using sdk list java.

Install the OpenJDK version:

sdk install java 11.0.2-open

If you’d rather use Amazon’s Corretto, simply use 11.0.2-amzn for the name. If you want to be as hipster as possible, you can even use Java 12!

sdk install java 12.0.0-open

Azul’s Zulu is also available if you use 12.0.0-zulu for the name. |

Install JHipster 6

A beta of JHipster 6 was released today. You can install it using the command below.

npm install -g generator-jhipster@beta

The npm command is part of Node.js. You’ll need to have Node 10.x to install JHipster and run useful commands. |

Create a Spring Boot + Angular App that runs on Java 11+

The most basic way to get started with JHipster is to create a new directory, cd into it, and run jhipster. You’ll be prompted to answer a number of questions about the app you’d like to create. Question range from the name of your app, to the authentication type you’d like to use, to SQL vs. NoSQL.

JHipster also has a domain language (called JDL for JHipster Domain Language) that you can use to define your app.

application {
  config {}

If you used the above code to create your app, it’ll use the default values:

  • baseName: jhipster
  • applicationType: monolith
  • databaseType: sql
  • etc.

You can see all the default values in JHipster’s JDL documentation. |

To generate an OAuth 2.0-enabled app with JHipster, create an app.jh file in a new project directory (e.g., ~/hipapp):

application {
  config {
    baseName hipapp
    authenticationType oauth2

Open a terminal window and navigate to the same directory as this file. Run the following command to generate a Spring Boot API with an Angular UI.

Make sure you’re not in your home directory! Your project will be generated in the same directory as app.jh. |

jhipster import-jdl app.jh

This will create a multitude of files and install dependencies using npm install. Your terminal should look similar to the following when you run this command:

If you’d prefer to see what this command looks line in-action, you can watch the recording below.

Since you specified oauth2 as the authentication type, a Docker Compose configuration will be installed for Keycloak.

Keycloak is an Apache-licensed open source identity and access management solution. In addition to creating a src/main/docker/keycloak.yml file for Docker Compose, JHipster generates a src/main/docker/config/realm-config directory with files in it that configure Keycloak to work with JHipster out-of-the-box.

Run Your JHipster App and Log In with Keycloak

Keycloak must be running for your JHipster app to start successfully. This is because Spring Security 5.1’s first-class OIDC support is leveraged in JHipster 6.

This OIDC support includes discovery, which means that Spring Security talks to a /.well-known/openid-configuration endpoint to configure itself. I completed the migration myself and deleted more code than I added!

Start Keycloak using Docker Compose:

docker-compose -f src/main/docker/keycloak.yml up -d

If you don’t have Docker Compose installed, see these instructions for how to install it. |

Then start your application using Maven:


When your app is up and running, open [http://localhost:8080](http://localhost:8080) in your favorite browser and click sign in. You’ll be redirected to Keycloak, where you can enter admin/admin to log in.

Pretty slick, eh? You just created a modern single page application (SPA) that uses the latest released version of Angular! Not only that, but it uses the most secure form of OAuth 2.0 - authorization code flow.

| | If you’re confused by how OAuth 2.0 and OpenID Connect (OIDC) work together, please see What the Heck is OAuth? In short, OIDC is a thin layer on top of OAuth 2.0 that adds identity. |

Use Okta: We’re Always On!

Keycloak is an excellent project that works great for development and testing. However, if you use it in production, you’ll be responsible for maintaining it, updating it to the latest releases, and making sure it’s up 24/7. For these reasons, I recommend using Okta in production. After all, we’re always on! 😃

Create an OpenID Connect Web Application

To begin, sign up for a forever-free Okta developer account (or sign in to {yourOktaDomain} if you already have an account).

Once you’re signed in to Okta, register your client application.

Your settings should resemble the screenshot below when you’re finished.

Create an okta.env file in your project’s root directory and replace the {..} values with those from your Okta application:

export SPRING_SECURITY_OAUTH2_CLIENT_PROVIDER_OIDC_ISSUER_URI="https://{yourOktaDomain}/oauth2/default"

Add *.env to your .gitignore file so this file won’t end up in your source control system. |

Create Groups and Add Them as Claims to the ID Token

JHipster is configured by default to work with two types of users: administrators and users. Keycloak is configured with users and groups automatically, but you need to do some one-time configuration for your Okta organization.

Create a ROLE_ADMIN and ROLE_USER group (Users > Groups > Add Group) and add users to them. You can use the account you signed up with, or create a new user (Users > Add Person). Navigate to API > Authorization Servers, and click on the the default server. Click the Claims tab and Add Claim. Name it groups, and include it in the ID Token. Set the value type to Groups and set the filter to be a Regex of .*. Click Create.

Start your application with the following commands:

source okta.env

Navigate to [http://localhost:8080](http://localhost:8080) and log in with your Okta credentials.

Isn’t it cool how Spring Boot and Spring Security make it easy to switch OIDC providers?!

CRUD with JHipster

I’ve barely scratched the service of what JHipster is capable of in this post. For example, you can create CRUD functionality for entities (with tests!) using JDL. For example, create a blog.jh file with the code below.

entity Blog {
  name String required minlength(3),
  handle String required minlength(2)

entity BlogEntry {
title String required,
content TextBlob required,
date Instant required

entity Tag {
name String required minlength(2)

relationship ManyToOne {
Blog{user(login)} to User,
BlogEntry{blog(name)} to Blog

relationship ManyToMany {
BlogEntry{tag(name)} to Tag{entry}

paginate BlogEntry, Tag with infinite-scroll

Then run jhipster import-jdl blog.jh in your project. The jdl-samples GitHub repository has many more examples.

Thanks for reading ❤

If you liked this post, share it with all of your programming buddies!

Follow me on Facebook | Twitter

Learn More

Java Programming Masterclass for Software Developers

Selenium WebDriver with Java -Basics to Advanced+Frameworks

Java In-Depth: Become a Complete Java Engineer!

JSP, Servlets and JDBC for Beginners: Build a Database App

JSP, Servlet, JSLT + Hibernate: A complete guide

Top 5 Java Test Frameworks for Automation in 2019

Java Hibernate Tutorial for Beginners

50+ Java Interview Questions for Programmers

Functional programming for Java developers


17.50 GEEK