See quickstart Menu

How to authenticate users in a Java Spring Boot app

This guide provides detailed instructions on how to add user authentication via OneLogin to a Java Spring Boot application.

This application is based utilizes Spring Security’s OAuth2 Client to complete an OpenId Connect Authorization Code flow via OneLogin.

Follow the steps below to add user authentication.

  1. Configure OneLogin
  2. Configure the Java Spring Boot application to connect to OneLogin
  3. Start the application and login, logout.

1. Configure OneLogin

Create a new OpenId Connect (OIDC) application from the OneLogin Administration panel.

Add a new App


Search for OIDC and select the OpenId Connect app

Add OIDC App

Create a display name for your app and Save.

Set App Name

Set a callback url. For this example, we will use http://localhost:8081/login to test.

Set Redirect URI

On the SSO tab, note the Client ID and Client Secret. Then change the Token Endpoint Authentication Method to POST. Click Save.

Get Client ID, Client Secret

Go to the Users section to locate your test user and assign the recently created application to that user.

Assign App

2. Configure the application to connect to OneLogin

Get the sample app

Pull the source for the sample Spring Boot App from Github.

Setup environment variables

We will store our OIDC application credentials as environment variables.

Navigate to /src/main/resources folder and update the application.yml with your OneLogin account subdomain and your OIDC app client_id and client_secret.

      clientId: <your-onelogin-oidc-app-client-id>
      clientSecret: <}your-onelogin-oidc-app-client-secret>
      accessTokenUri: http://<subdomain>
      userAuthorizationUri: http://<subdomain>
      tokenName: access_token
      authorizedGrantTypes: authorization_code
      scope: openid,profile,email
      userInfoUri: http://<subdomain>
  port : 8081

3. Start the application

It’s time to start the application and test our authentication flow.

mvn spring-boot:run

This command makes the application available to test on http://localhost:8081/.


Click Login to start the authentication flow.

Start App

This triggers a GET request against the /login route of your application and redirects you to secure login page hosted by OneLogin.

Enter username, password, and possibly MFA, depending on your security policy configuration in OneLogin.


Once authentication is complete, you’re redirected back to the /login route of your local application and provided with an authorization code.

The /login route passes the authorization code into OAuth2 client, which sends a POST request to OneLogin and exchanges the code for an Access Token.

The Access Token in turn is used to access resources by sending a request along with the token to the resource endpoint. In this case, we are retrieving information about the user by requesting data from the user info endpoint.

Login Success


Clicking the logout button makes a request to the /logout endpoint. The logout endpoint will terminate the users local session.

Additional Resources

Have a Question?

Found a problem or a bug? Submit a support ticket.

Looking for walkthroughs or how-to guides on OneLogin's user and admin features? Check out the documentation in our Knowledge Base.

Have a product idea or request? Share it with us in our Ideas Portal.