Build a React Native Application and Authenticate with OAuth 2.0

Build a React Native Application and Authenticate with OAuth 2.0

With Okta and OpenID Connect (OIDC) you can easily integrate authentication into a React Native application and never have to build it yourself again. OIDC allows you to authenticate directly against the Okta API, and this article shows you how to do just that in a React Native application. Today you’ll see how to log a user into your React Native application using an OIDC redirect via the AppAuth library.

React Native is a pretty slick framework. Unlike Ionic and other hybrid mobile frameworks, it allows you to use web technologies (React and JavaScript) to build native mobile apps. There is no browser or WebView involved, so developing a mobile app with React Native is similar to using the native SDK in that you’ll do all your testing on an emulator or device. There is no way to test it in your browser like there is with Ionic. This can be a benefit in that you don’t have to write code that works in-browser and on-device separately.

If you look at Google Trends, you can see that React Native is even more popular than Android and iOS for native development!

Today I’m going to show you how to develop a React Native app with the latest and greatest releases. At the time of this writing, that’s React 16.2.0 and React Native 0.54.0. You’ll create a new app, add AppAuth for authentication, authenticate with Okta, and see it running on both iOS and Android.

AppAuth is a client SDK for native apps to authenticate and authorize end-users using OAuth 2.0 and OpenID Connect. Available for iOS, macOS, Android and Native JS environments, it implements modern security and usability best practices for native app authentication and authorization.

Create Your React Native Application

React Native has a react-native command-line tool (CLI) that you can use to create new React apps. Before you install it, make sure you have Node v6 or later installed.

Install react-native-cli and create a new project called oktarn:

npm install -g react-native-cli
react-native init OktaRN

This will print out instructions for running your app when it completes.

To run your app on iOS:
   cd /Users/mraible/OktaRN
   react-native run-ios
   - or -
   Open ios/OktaRN.xcodeproj in Xcode
   Hit the Run button
To run your app on Android:
   cd /Users/mraible/OktaRN
   Have an Android emulator running (quickest way to get started), or a device connected
   react-native run-android

NOTE: There’s a bug in React Native 0.57.1. If you see an error saying interopRequireDefault does not exist, run npm i @babel/runtime to fix it.

If you’re on a Mac, run react-native run-ios to open iOS emulator. You should be presented with the rendered App.js.

Rendered App.js

NOTE: If you get a Print: Entry, ":CFBundleIdentifier", Does Not Exist error, delete your ~/.rncache directory. There’s a GitHub issue has more information.

If you’re on Windows or Linux, I’d suggest trying the Android emulator or your Android device (if you have one). If it doesn’t work, don’t worry, I’ll show you how to make that work later on.

TIP: You can use TypeScript instead of JavaScript in your React Native app using Microsoft’s TypeScript React Native Starter. If you decide to go this route, I’d recommend following the steps to convert your app after you’ve completed this tutorial.

React Native and OAuth 2.0

In this example, I’ll use React Native App Auth, a library created by Formidable. The reason I’m using this library is three-fold: 1) they provide an excellent example that I was able to make work in just a few minutes, 2) it uses AppAuth (a mature OAuth client implementation), and 3) I was unable to get anything else working.

  • I tried react-native-oauth but discovered it required using an existing provider before adding a new one. I only wanted to have Okta as a provider. Also, its high number of issues and pull requests served as a warning sign.
  • I tried react-native-simple-auth but had problems getting the deprecated Navigator component to work with the latest React Native release.
  • I tried doing this OAuth 2 with React Native tutorial, but also had problems redirecting back to my app.

Create Native Application in Okta

Before you add AppAuth to your React Native application, you’ll need an app to authorize against. If you don’t have a free-forever Okta Developer account, get one today!

Developer Signup

Log in to your Okta Developer account and navigate to Applications > Add Application. Click Native and click Next. Give the app a name you’ll remember (e.g., React Native), select Refresh Token as a grant type, in addition to the default Authorization Code. Copy the Login redirect URI (e.g., {yourOktaScheme}:/callback) and save it somewhere. You’ll need this value when configuring your app.

Click Done and you should see a client ID on the next screen. Copy and save this value as well.

Add React Native AppAuth for Authentication

To install App Auth for React Native, run the following commands:

npm i react-native-app-auth@3.1.0
react-native link

After running these commands, you have to configure the native iOS projects. I’ve copied the steps below for your convenience.

iOS Setup

React Native App Auth depends on AppAuth-ios, so you have to configure it as a dependency. The easiest way to do that is to use CocoaPods. To install CocoaPods, run the following command in your project’s root directory:

sudo gem install cocoapods

Create a Podfile in the ios directory of your project that specifies AppAuth-ios as a dependency. Make sure that OktaRN matches the name in app.json.

platform :ios, '11.0'

target 'OktaRN' do
  pod 'AppAuth', '>= 0.94'
end

Then navigate to the ios directory and run pod install. This can take a while the first time, even on a fast connection. Now is a good time to grab a coffee or a scotch! 🥃

TIP: If you get an error when you run pod install, try running pod repo update first.

Open your project in Xcode by running open OktaRN.xcworkspace.

If you intend to support iOS 10 and older, you need to define the supported redirect URL schemes in ios/OktaRN/Info.plist as follows:

<key>CFBundleURLTypes</key>
<array>
  <dict>
    <key>CFBundleURLName</key>
    <string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>
    <key>CFBundleURLSchemes</key>
    <array>
      <string>{yourOktaScheme}</string>
    </array>
  </dict>
</array>

Below is what mine looks like after I changed my app identifier and added this key.

<key>CFBundleIdentifier</key>
<string>com.okta.developer.reactnative.$(PRODUCT_NAME:rfc1034identifier)</string>
<key>CFBundleURLTypes</key>
<array>
  <dict>
    <key>CFBundleURLName</key>
    <string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>
    <key>CFBundleURLSchemes</key>
    <array>
      <string>{yourOktaScheme}</string>
    </array>
  </dict>
</array>

Open AppDelegate.h in your Xcode project (OktaRN > OktaRN > AppDelegate.h) and add the lines with the + next to them below.

+ #import "RNAppAuthAuthorizationFlowManager.h"

- @interface AppDelegate : UIResponder <UIApplicationDelegate>
+ @interface AppDelegate : UIResponder <UIApplicationDelegate, RNAppAuthAuthorizationFlowManager>

+ @property (nonatomic, weak) id<RNAppAuthAuthorizationFlowManagerDelegate>authorizationFlowManagerDelegate;

AppDelegate.h

This property holds the authorization flow information that started before you redirect to Okta. After Okta authorizes you, it redirects to the redirect_uri that’s passed in.

The authorization flow starts from an openURL() app delegate method. To add it, open AppDelegate.m. At the bottom of the class (before @end), add the openURL() method.

- (BOOL)application:(UIApplication *)app
            openURL:(NSURL *)url
            options:(NSDictionary<NSString *, id> *)options {
  return [self.authorizationFlowManagerDelegate resumeExternalUserAgentFlowWithURL:url];
}

Build Your React Native App

Open your project’s folder in your favorite text editor. Replace the code in App.js with the following JavaScript. This code allows you to authorize, refresh your access token, and revoke it.

import React, { Component } from 'react';
import { Alert, UIManager, LayoutAnimation } from 'react-native';
import { authorize, refresh, revoke } from 'react-native-app-auth';
import { Page, Button, ButtonContainer, Form, Heading } from './components';

UIManager.setLayoutAnimationEnabledExperimental &&
  UIManager.setLayoutAnimationEnabledExperimental(true);

type State = {
  hasLoggedInOnce: boolean,
  accessToken: ?string,
  accessTokenExpirationDate: ?string,
  refreshToken: ?string
};

const config = {
  issuer: 'https://{yourOktaDomain}/oauth2/default',
  clientId: '{clientId}',
  redirectUrl: '{yourOktaScheme}:/callback',
  additionalParameters: {},
  scopes: ['openid', 'profile', 'email', 'offline_access']
};

export default class App extends Component<{}, State> {
  state = {
    hasLoggedInOnce: false,
    accessToken: '',
    accessTokenExpirationDate: '',
    refreshToken: ''
  };

  animateState(nextState: $Shape<State>, delay: number = 0) {
    setTimeout(() => {
      this.setState(() => {
        LayoutAnimation.easeInEaseOut();
        return nextState;
      });
    }, delay);
  }

  authorize = async () => {
    try {
      const authState = await authorize(config);
      this.animateState(
        {
          hasLoggedInOnce: true,
          accessToken: authState.accessToken,
          accessTokenExpirationDate: authState.accessTokenExpirationDate,
          refreshToken: authState.refreshToken
        },
        500
      );
    } catch (error) {
      Alert.alert('Failed to log in', error.message);
    }
  };

  refresh = async () => {
    try {
      const authState = await refresh(config, {
        refreshToken: this.state.refreshToken
      });

      this.animateState({
        accessToken: authState.accessToken || this.state.accessToken,
        accessTokenExpirationDate:
          authState.accessTokenExpirationDate || this.state.accessTokenExpirationDate,
        refreshToken: authState.refreshToken || this.state.refreshToken
      });
    } catch (error) {
      Alert.alert('Failed to refresh token', error.message);
    }
  };

  revoke = async () => {
    try {
      await revoke(config, {
        tokenToRevoke: this.state.accessToken,
        sendClientId: true
      });
      this.animateState({
        accessToken: '',
        accessTokenExpirationDate: '',
        refreshToken: ''
      });
    } catch (error) {
      Alert.alert('Failed to revoke token', error.message);
    }
  };

  render() {
    const {state} = this;
    return (
      <Page>
        {!!state.accessToken ? (
          <Form>
            <Form.Label>accessToken</Form.Label>
            <Form.Value>{state.accessToken}</Form.Value>
            <Form.Label>accessTokenExpirationDate</Form.Label>
            <Form.Value>{state.accessTokenExpirationDate}</Form.Value>
            <Form.Label>refreshToken</Form.Label>
            <Form.Value>{state.refreshToken}</Form.Value>
          </Form>
        ) : (
          <Heading>{state.hasLoggedInOnce ? 'Goodbye.' : 'Hello, stranger.'}</Heading>
        )}

        <ButtonContainer>
          {!state.accessToken && (
            <Button onPress={this.authorize} text="Authorize" color="#017CC0"/>
          )}
          {!!state.refreshToken && <Button onPress={this.refresh} text="Refresh" color="#24C2CB"/>}
          {!!state.accessToken && <Button onPress={this.revoke} text="Revoke" color="#EF525B"/>}
        </ButtonContainer>
      </Page>
    );
  }
}

Make sure to adjust config with your settings.

const config = {
  issuer: 'https://{yourOktaDomain}/oauth2/default',
  clientId: '{clientId}',
  redirectUrl: '{yourOktaScheme}:/callback',
  ...
};

This code uses styled-components, so you’ll need to install that as a dependency.

NOTE: Make sure to navigate into the root directory of your project before running the commands below.

npm i styled-components@3.4.9

Then copy the components directory into your project’s root directory from Formidable’s example.

svn export https://github.com/FormidableLabs/react-native-app-auth/trunk/Example/Latest/components

Grab the background image that’s referenced in the Page.js component too.

svn export https://github.com/FormidableLabs/react-native-app-auth/trunk/Example/Latest/assets

Run on iOS Simulator

Run your app with react-native run-ios.

You should see a screen that says “Hello, stranger.” Click on Authorize, and you’ll be prompted to continue or cancel.

Hello, stranger Cancel or Continue

Click Continue and you should see an Okta sign-in form. Enter your credentials, and you’ll be redirected back to the application.

Okta Sign-In Access Token Info

You can click Refresh to watch the values for the access token and expire date change.

TIP: If animations happen slowly in iOS Simulator, toggle Debug > Slow Animations.

Android Setup

To configure the native Android project, start by upgrading the version of Gradle it uses.

cd android
./gradlew wrapper --gradle-version 4.10.2

You will likely see a warning when Gradle configures your projects.

WARNING: Configuration 'compile' is obsolete and has been replaced with 'implementation' and 'api'.

To fix this, modify android/app/src/build.gradle and change the react-native-app-auth dependency to use implementation instead of compile.

dependencies {
    implementation project(':react-native-app-auth')
    // other dependencies
}

React Native App Auth for Android depends on AppAuth-android. You just need to add the appAuthRedirectScheme property to the defaultConfig in android/app/build.gradle:

android {
  defaultConfig {
    ...
    manifestPlaceholders = [
    // match the protocol of your "Login redirect URI"
        appAuthRedirectScheme: '{yourOktaScheme}'
    ]
  }
}

After making this change, my defaultConfig looks as follows.

defaultConfig {
    applicationId "com.oktarn"
    minSdkVersion rootProject.ext.minSdkVersion
    targetSdkVersion rootProject.ext.targetSdkVersion
    versionCode 1
    versionName "1.0"
    ndk {
        abiFilters "armeabi-v7a", "x86"
    }
    manifestPlaceholders = [
        appAuthRedirectScheme: "com.oktapreview.dev-737523"
    ]
}

Run on Android

To try it on an Android emulator, run react-native run-android from your project’s root directory. If you don’t have a phone plugged in or an Android Virtual Device (AVD) running, you’ll see an error:

Could not install the app on the device, read the error above for details.

To fix this, open Android Studio, choose open existing project, and select the android directory in your project. If you’re prompted to update anything, approve it.

To create a new AVD, navigate to Tools > Android > AVD Manager. Create a new Virtual Device and click Play. I chose a Pixel 2 as you can see from my settings below.

AVD Pixel 2

Run npm run android again. You should see a welcome screen and be able to authorize successfully.

Hello, stranger Okta Sign-In Access Token on Android

Get and View an ID Token

If you’d like to get an ID token in addition to an access token, add idToken as a property of type State and the state variable in App.js.

type State = {
  ...
  idToken: ?string
};

export default class App extends Component<{}, State> {
  ...
  state = {
    ...
    idToken: ''
  };

Then update the authorize() method to set the property from authState. You’ll want to add similar logic in the refresh() and revoke() methods.

authorize = async () => {
  try {
    const authState = await authorize(config);
    this.animateState(
      {
        hasLoggedInOnce: true,
        accessToken: authState.accessToken,
        accessTokenExpirationDate: authState.accessTokenExpirationDate,
        refreshToken: authState.refreshToken,
        idToken: authState.idToken
      },
      500
    );
  } catch (error) {
    Alert.alert('Failed to log in', error.message);
  }
};

To see what’s in your ID token, install buffer.

npm i buffer

Import it at the top of App.js.

import { Buffer } from 'buffer';

Then change the render() method to decode it.

render() {
  const {state} = this;
  if (state.idToken) {
    const jwtBody = state.idToken.split('.')[1];
    const base64 = jwtBody.replace('-', '+').replace('_', '/');
    const decodedJwt = Buffer.from(base64, 'base64');
    state.idTokenJSON = JSON.parse(decodedJwt);
  }
  ...
}

Finally, add a <Form.Label> and <Form.Value> row after the one that displays the access token.

<Form.Label>ID Token</Form.Label>
<Form.Value>{JSON.stringify(state.idTokenJSON)}</Form.Value>

Run react-native run-ios (or react-native run-android) and you should see the claims in the ID token after authorizing with Okta. Below is a screenshot proving it works in iOS Simulator.

ID Token on iOS

Call an API with Your Access Token

Now that you have an access token, what can you do with it? You can call an Okta-protected API with it in an Authorization header!

I wrote about how to create a “Good Beers” API in Bootiful Development with Spring Boot and React. You can use the backend of that application to prove it works.

Clone the project from GitHub and check out the okta branch.

git clone -b okta https://github.com/oktadeveloper/spring-boot-react-example.git

Modify spring-boot-react-example/server/src/main/resources/application.properties to set the issuer and clientId.

okta.oauth2.issuer=https://{yourOktaDomain}/oauth2/default
okta.oauth2.clientId={clientId}

NOTE: You’ll need to have Java 8 installed to run this Spring Boot application.

Start the app by running ./mvnw from the server directory.

Back to the React Native client. In App.js, add beers as a property of state.

state = {
  ...
  beers: []
};

Set it to this same value in the revoke() method. Add a fetchGoodBeers() method that uses the access token to call the backend.

fetchGoodBeers = async () => {
  if (this.state.beers.length) {
    // reset to id token if beers is already populated
    this.animateState({beers: []})
  } else {
    try {
      const response = await fetch('http://localhost:8080/good-beers', {
        headers: {
          'Authorization': `Bearer ${this.state.accessToken}`
        }
      });
      const data = await response.json();
      this.animateState({beers: data});
    } catch(error) {
      console.error(error);
    }
  }
};

TIP: For this to work in the Android emulator (and on a real phone), you’ll need to change localhost to your IP address.

In the <ButtonContainer> at the bottom, add a “Good Beers” button that allows you to call the API, as well as press it again to view the ID Token.

{!!state.accessToken && <Button onPress={this.fetchGoodBeers} text={!this.state.beers.length ? 'Good Beers' : 'ID Token'} color="#008000" />}

Modify the row where you display the ID token to show the JSON from the API.

<Form.Label>{state.beers.length ? 'Good Beers' : 'ID Token'}</Form.Label>
<Form.Value>{JSON.stringify(state.beers.length ? state.beers : state.idTokenJSON)}</Form.Value>

In iOS Simulator, press Command + R to reload everything and you should see the JSON when you click on the Good Beers button. You can reload in Android using Command + M (on Mac, CTRL + M on other operating systems).

Good Beers on iOS Good Beers on Android

Learn More about React Native and React

I hope you’ve enjoyed this whirlwind tour of how to do authentication with Okta and React Native. You can learn more about React Native on its official site. You can also add to its ~69K stars on GitHub.

You can find the source code for this application at https://github.com/oktadeveloper/okta-react-native-app-auth-example.

If you’re interested in seeing how to do regular React development with Okta, I encourage you to check out the following resources:

If you have any questions about this article, please hit me up on Twitter @mraible or leave a comment below. Don’t forget to follow @oktadev too!

Changelog:

Matt Raible is a well-known figure in the Java community and has been building web applications for most of his adult life. For over 20 years, he has helped developers learn and adopt open source frameworks and use them effectively. He's a web developer, Java Champion, and Developer Advocate at Okta. Matt has been a speaker at many conferences worldwide, including Devnexus, Devoxx Belgium, Devoxx France, Jfokus, and JavaOne. He is the author of The Angular Mini-Book, The JHipster Mini-Book, Spring Live, and contributed to Pro JSP. He is a frequent contributor to open source and a member of the JHipster development team. You can find him online @mraible and raibledesigns.com.

Okta Developer Blog Comment Policy

We welcome relevant and respectful comments. Off-topic comments may be removed.