Angular 10 + Spring Boot: JWT Authentication example | Spring Security

In this tutorial, I will show you how to build a full stack Angular 10 + Spring Boot JWT Authentication example. The back-end server uses Spring Boot with Spring Security for JWT authentication and Spring Data JPA for interacting with database. The front-end will be built using Angular 10 with HttpInterceptor & Form validation.

Related Posts:
Angular 10 + Spring Boot example: Build a CRUD App
Spring Boot, MongoDB: JWT Authentication with Spring Security

JWT (JSON Web Token)

JWT is popular for Authentication and Information Exchange. Server encodes data into a JSON Web Token and send it to the Client. The Client saves the JWT, then every Request from Client to protected routes or resources should be attached that JWT (commonly at header). The Server will validate that JWT and return the Response.

in-depth-introduction-jwt-token-based-authentication

The big advantage of JWT (Token-based Authentication) is that we store the Token on Client side: Local Storage for Browser, Keychain for IOS and SharedPreferences for Android… So we don’t need to build another backend project that supports Native Apps or an additional Authentication module for Native App users.

There are three important parts of a JWT: Header, Payload, Signature. Together they are combined to a standard structure: header.payload.signature.

The Client typically attact JWT in Authorization header with Bearer prefix:

Authorization: Bearer [header].[payload].[signature]

For more details, you can visit:
In-depth Introduction to JWT-JSON Web Token

Angular 10 Spring Boot Authentication example

It will be a full stack, with Spring Boot for back-end and Angular 10 for front-end. The system is secured by Spring Security with JWT Authentication.

  • User can signup new account, login with username & password.
  • Authorization by the role of the User (admin, moderator, user)

Screenshots

Here are UI screenshots of our system.

– Anyone can access a public page before logging in:

angular-10-spring-boot-jwt-authentication-public

– New user signups:

angular-10-spring-boot-jwt-authentication-signup

– After signup is successful, User can login:

angular-10-spring-boot-jwt-authentication-login

-Loggedin User can access Profile page/ User page:

angular-10-spring-boot-jwt-authentication-profile

angular-10-spring-boot-jwt-authentication-user

– This is UI for admin:

angular-10-spring-boot-jwt-authentication-admin

– If a User who doesn’t have Admin role tries to access Admin/Moderator Board page:

angular-10-spring-boot-jwt-authentication-unauthorized

Demo

This is full Angular 10 + Spring Boot JWT authentication demo (with form validation, check signup username/email duplicates, test authorization with 3 roles: Admin, Moderator, User). The video shows Angular version 8, but flow and logic are the same as Angular version 10.

Flow for User Registration and User Login

The diagram shows flow for User Registration process and User Login process.

angular-10-spring-boot-jwt-authentication-flow

It’s not too difficult to understand. We have 2 endpoints for authentication:

  • api/auth/signup for User Registration
  • api/auth/signin for User Login

If Client wants to send request to protected data/endpoints, a legal JWT must be added to HTTP Authorization Header.

Spring Boot & Spring Security for Back-end

Overview

Our Spring Boot Application can be summarized in the diagram below:

angular-10-spring-boot-authentication-spring-security-architecture

Let me explain it.

Spring Security

WebSecurityConfigurerAdapter is the crux of our security implementation. It provides HttpSecurity configurations to configure cors, csrf, session management, rules for protected resources. We can also extend and customize the default configuration that contains the elements below.

UserDetailsService interface has a method to load User by username and returns a UserDetails object that Spring Security can use for authentication and validation.

UserDetails contains necessary information (such as: username, password, authorities) to build an Authentication object.

UsernamePasswordAuthenticationToken gets {username, password} from login Request, AuthenticationManager will use it to authenticate a login account.

AuthenticationManager has a DaoAuthenticationProvider (with help of UserDetailsService & PasswordEncoder) to validate UsernamePasswordAuthenticationToken object. If successful, AuthenticationManager returns a fully populated Authentication object (including granted authorities).

OncePerRequestFilter makes a single execution for each request to our API. It provides a doFilterInternal() method that we will implement parsing & validating JWT, loading User details (using UserDetailsService), checking Authorizaion (using UsernamePasswordAuthenticationToken).

AuthenticationEntryPoint will catch unauthorized error and return a 401 when Clients access protected resources without authentication.

Repository contains UserRepository & RoleRepository to work with Database, will be imported into Controller.

Controller receives and handles request after it was filtered by OncePerRequestFilter.

AuthController handles signup/login requests

TestController has accessing protected resource methods with role based validations.

Technology

To implement the server with concept above, we will use:
– Java 8
– Spring Boot 2.1.8.RELEASE (with Spring Security, Spring Web, Spring Data)
– jjwt 0.9.1
– PostgreSQL/MySQL
– Maven 3.6.1

Project Structure

The structure of Spring Boot back-end project is pretty complicated:

angular-10-spring-boot-authentication-spring-security-project-structure

You can see that there are 5 packages:

security: we configure Spring Security & implement Security Objects here.

  • WebSecurityConfig extends WebSecurityConfigurerAdapter
  • UserDetailsServiceImpl implements UserDetailsService
  • UserDetailsImpl implements UserDetails
  • AuthEntryPointJwt implements AuthenticationEntryPoint
  • AuthTokenFilter extends OncePerRequestFilter
  • JwtUtils provides methods for generating, parsing, validating JWT

controllers handle signup/login requests & authorized requests.

  • AuthController: @PostMapping(‘/signin’), @PostMapping(‘/signup’)
  • TestController: @GetMapping(‘/api/test/all’), @GetMapping(‘/api/test/[role]’)

repository has intefaces that extend Spring Data JPA JpaRepository to interact with Database.

  • UserRepository extends JpaRepository
  • RoleRepository extends JpaRepository

models defines two main models for Authentication (User) & Authorization (Role). They have many-to-many relationship.

  • User: id, username, email, password, roles
  • Role: id, name

payload defines classes for Request and Response objects

We also have application.properties for configuring Spring Datasource, Spring Data JPA and App properties (such as JWT Secret string or Token expiration time).

Implementation

You can find step by step to implement this Spring Boot – Spring Security App in the post:
Secure Spring Boot App with Spring Security & JWT Authentication

And this is for working with MongoDB:
Spring Boot, MongoDB: JWT Authentication with Spring Security

Angular 10 for Front-end

Overview

Our Angular 10 App can be summarized in component diagram below:

angular-10-spring-boot-jwt-authentication-client-overview

Let’s try to understand it right now.

– The App component is a container using Router. It gets user token & user information from Browser Session Storage via token-storage.service. Then the navbar now can display based on the user login state & roles.

Login & Register components have form for submission data (with support of Form Validation). They use token-storage.service for checking state and auth.service for sending signin/signup requests.

auth.service uses Angular HttpClient ($http service) to make authentication requests.
– every HTTP request by $http service will be inspected and transformed before being sent by auth-interceptor.

Home component is public for all visitor.

Profile component get user data from Session Storage.

BoardUser, BoardModerator, BoardAdmin components will be displayed depending on roles from Session Storage. In these components, we use user.service to get protected resources from API.

Technology

– Angular 10
– RxJS 6

Project Structure

This is the folder structure of our Angular front-end project:

angular-10-spring-boot-jwt-authentication-client-project-structure

You can understand it properly without any explanation because we’ve looked at the overview before.

Implementation

You can find step by step to implement this Angular 10 App in the post:
Angular 10 JWT Authentication example with Web Api

Older version: Angular 8 JWT Authentication with HttpInterceptor and Router

Further Reading

Conclusion

Now we have an overview of Angular 10 Spring Boot Authentication example using JWT, Spring Security, Angular HttpInterceptor along with flow for signup/login actions.

We also take a look at Spring Boot server architecture for JWT Authentication using Spring Sercurity & Spring Data JPA, as well as Angular project structure for building a front-end app working with JWT.

Next tutorials will show you more details about how to implement this interesting system:
– Back-end:

– Front-end:

You will want to know how to run both projects in one place:
How to Integrate Angular with Spring Boot Rest API

Happy learning, see you again!

Leave a Reply

Your email address will not be published. Required fields are marked *