Spring Boot Refresh Token with JWT example

In previous post, we’ve known how to build Token based Authentication & Authorization with Spring Security & JWT. This tutorial will continue to make JWT Refresh Token in the Java Spring Boot Application. You can know how to expire the JWT, then renew the Access Token with Refresh Token.

Related Posts:

Deploy Spring Boot App on AWS – Elastic Beanstalk
Docker Compose: Spring Boot and MySQL example

The code in this post bases on previous article that you need to read first:
Spring Boot Token based Authentication with Spring Security & JWT

Overview of Spring Boot Refresh Token with JWT example

We already have a Spring Boot application in that:

  • User can signup new account, or login with username & password.
  • By User’s role (admin, moderator, user), we authorize the User to access resources

With APIs:

POST/api/auth/signupsignup new account
POST/api/auth/signinlogin an account
GET/api/test/allretrieve public content
GET/api/test/useraccess User’s content
GET/api/test/modaccess Moderator’s content
GET/api/test/adminaccess Admin’s content

For more details, please visit this post.

We’re gonna add Token Refresh to this Spring Boot – Spring Security Project.
The final result can be described with following requests/responses:

– Send /signin request, return response with refreshToken.


– Access resource successfully with accessToken.


– When the accessToken is expired, user cannot use it anymore.


– Send /refreshtoken request, return response with new accessToken.


– Access resource successfully with new accessToken.


– Send an expired Refresh Token.


– Send an inexistent Refresh Token.


– Axios Client to check this: Axios Interceptors tutorial with Refresh Token example

– Using React Client:

– Or Vue Client:

– Angular Client:

Flow for Spring Boot Refresh Token with JWT

The diagram shows flow of how we implement Authentication process with Access Token and Refresh Token.


– A legal JWT must be added to HTTP Authorization Header if Client accesses protected resources.
– A refreshToken will be provided at the time user signs in.

How to Expire JWT Token in Spring Boot

The Refresh Token has different value and expiration time to the Access Token.
Regularly we configure the expiration time of Refresh Token larger than Access Token’s.

Open application.properties for configuring App properties:

# Spring Datasource, Spring Data...
# App Properties
bezkoder.app.jwtSecret= bezKoderSecretKey
bezkoder.app.jwtExpirationMs= 3600000
bezkoder.app.jwtRefreshExpirationMs= 86400000
## For test
#bezkoder.app.jwtExpirationMs= 60000
#bezkoder.app.jwtRefreshExpirationMs= 120000

Update JwtUtils class. Now it has 3 main funtions:

  • generate a JWT from username
  • get username from JWT
  • validate a JWT: JWT Access Token is expired with ExpiredJwtException


package com.bezkoder.spring.security.jwt.security.jwt;
import java.util.Date;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.stereotype.Component;
import com.bezkoder.spring.security.jwt.security.services.UserDetailsImpl;
import io.jsonwebtoken.*;
public class JwtUtils {
  private static final Logger logger = LoggerFactory.getLogger(JwtUtils.class);
  private String jwtSecret;
  private int jwtExpirationMs;
  public String generateJwtToken(UserDetailsImpl userPrincipal) {
    return generateTokenFromUsername(userPrincipal.getUsername());
  public String generateTokenFromUsername(String username) {
    return Jwts.builder().setSubject(username).setIssuedAt(new Date())
        .setExpiration(new Date((new Date()).getTime() + jwtExpirationMs)).signWith(SignatureAlgorithm.HS512, jwtSecret)
  public String getUserNameFromJwtToken(String token) {
    return Jwts.parser().setSigningKey(jwtSecret).parseClaimsJws(token).getBody().getSubject();
  public boolean validateJwtToken(String authToken) {
    try {
      return true;
    } catch (SignatureException e) {
      logger.error("Invalid JWT signature: {}", e.getMessage());
    } catch (MalformedJwtException e) {
      logger.error("Invalid JWT token: {}", e.getMessage());
    } catch (ExpiredJwtException e) {
      logger.error("JWT token is expired: {}", e.getMessage());
    } catch (UnsupportedJwtException e) {
      logger.error("JWT token is unsupported: {}", e.getMessage());
    } catch (IllegalArgumentException e) {
      logger.error("JWT claims string is empty: {}", e.getMessage());
    return false;

Refresh Token Request and Response

Update the payloads for our RestAPIs:
– Requests:

  • TokenRefreshRequest: { refreshToken }

– Responses:

  • JwtResponse: { accessToken, type, refreshToken, id, username, email, roles }
  • MessageResponse: { message }
  • TokenRefreshResponse: { accessToken, type, refreshToken }


package com.bezkoder.spring.security.jwt.payload.request;
import javax.validation.constraints.NotBlank;
public class TokenRefreshRequest {
  private String refreshToken;
  public String getRefreshToken() {
    return refreshToken;
  public void setRefreshToken(String refreshToken) {
    this.refreshToken = refreshToken;


package com.bezkoder.spring.security.jwt.payload.response;
import java.util.List;
public class JwtResponse {
	private String token;
	private String type = "Bearer";
	private String refreshToken;
	private Long id;
	private String username;
	private String email;
	private List<String> roles;
	public JwtResponse(String accessToken, String refreshToken, Long id, String username, String email, List<String> roles) {
		this.token = accessToken;
		this.refreshToken = refreshToken;
		this.id = id;
		this.username = username;
		this.email = email;
		this.roles = roles;
	// getters and setters


package com.bezkoder.spring.security.jwt.payload.response;
public class TokenRefreshResponse {
  private String accessToken;
  private String refreshToken;
  private String tokenType = "Bearer";
  public TokenRefreshResponse(String accessToken, String refreshToken) {
    this.accessToken = accessToken;
    this.refreshToken = refreshToken;
  // getters and setters

Renew JWT Token in Spring Boot

In the AuthController class, we:

  • update the method for /signin endpoint with Refresh Token
  • expose the POST API for creating new Access Token from received Refresh Token


public class AuthController {
  AuthenticationManager authenticationManager;
  JwtUtils jwtUtils;
  RefreshTokenService refreshTokenService;
  public ResponseEntity<?> authenticateUser(@Valid @RequestBody LoginRequest loginRequest) {
    Authentication authentication = authenticationManager
        .authenticate(new UsernamePasswordAuthenticationToken(loginRequest.getUsername(), loginRequest.getPassword()));
    UserDetailsImpl userDetails = (UserDetailsImpl) authentication.getPrincipal();
    String jwt = jwtUtils.generateJwtToken(userDetails);
    List<String> roles = userDetails.getAuthorities().stream().map(item -> item.getAuthority())
    RefreshToken refreshToken = refreshTokenService.createRefreshToken(userDetails.getId());
    return ResponseEntity.ok(new JwtResponse(jwt, refreshToken.getToken(), userDetails.getId(),
        userDetails.getUsername(), userDetails.getEmail(), roles));
  public ResponseEntity<?> refreshtoken(@Valid @RequestBody TokenRefreshRequest request) {
    String requestRefreshToken = request.getRefreshToken();
    return refreshTokenService.findByToken(requestRefreshToken)
        .map(user -> {
          String token = jwtUtils.generateTokenFromUsername(user.getUsername());
          return ResponseEntity.ok(new TokenRefreshResponse(token, requestRefreshToken));
        .orElseThrow(() -> new TokenRefreshException(requestRefreshToken,
            "Refresh token is not in database!"));

In refreshtoken() method:

  • Firstly, we get the Refresh Token from request data
  • Next, get the RefreshToken object {id, user, token, expiryDate} from raw Token using RefreshTokenService
  • We verify the token (expired or not) basing on expiryDate field
  • Continue to use user field of RefreshToken object as parameter to generate new Access Token using JwtUtils
  • Return TokenRefreshResponse if everything is done
  • Or else, throw TokenRefreshException

Create Refresh Token Service

Refresh Token class

This class has one-to-one relationship with User class.


package com.bezkoder.spring.security.jwt.models;
import java.time.Instant;
import javax.persistence.*;
@Entity(name = "refreshtoken")
public class RefreshToken {
  @GeneratedValue(strategy = GenerationType.AUTO)
  private long id;
  @JoinColumn(name = "user_id", referencedColumnName = "id")
  private User user;
  @Column(nullable = false, unique = true)
  private String token;
  @Column(nullable = false)
  private Instant expiryDate;
  //getters and setters

Refresh Token Repository

Before creating the service, we need RefreshTokenRepository with finder methods:


package com.accolite.pru.health.AuthApp.repository;
import com.accolite.pru.health.AuthApp.model.token.RefreshToken;
import org.springframework.data.jpa.repository.JpaRepository;
import java.util.Optional;
public interface RefreshTokenRepository extends JpaRepository<RefreshToken, Long> {
    Optional<RefreshToken> findById(Long id);
    Optional<RefreshToken> findByToken(String token);

Refresh Token Service

After that, we have the RefreshTokenService service which uses RefreshTokenRepository above for providing several useful methods:

  • findByToken(): Find a RefreshToken based on the natural id i.e the token itself
  • createRefreshToken(): Create and return a new Refresh Token
  • verifyExpiration(): Verify whether the token provided has expired or not. If the token was expired, delete it from database and throw TokenRefreshException


package com.bezkoder.spring.security.jwt.security.services;
import java.time.Instant;
import java.util.Optional;
import java.util.UUID;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.stereotype.Service;
import org.springframework.transaction.annotation.Transactional;
import com.bezkoder.spring.security.jwt.exception.TokenRefreshException;
import com.bezkoder.spring.security.jwt.models.RefreshToken;
import com.bezkoder.spring.security.jwt.repository.RefreshTokenRepository;
import com.bezkoder.spring.security.jwt.repository.UserRepository;
public class RefreshTokenService {
  private Long refreshTokenDurationMs;
  private RefreshTokenRepository refreshTokenRepository;
  private UserRepository userRepository;
  public Optional<RefreshToken> findByToken(String token) {
    return refreshTokenRepository.findByToken(token);
  public RefreshToken createRefreshToken(Long userId) {
    RefreshToken refreshToken = new RefreshToken();
    refreshToken = refreshTokenRepository.save(refreshToken);
    return refreshToken;
  public RefreshToken verifyExpiration(RefreshToken token) {
    if (token.getExpiryDate().compareTo(Instant.now()) < 0) {
      throw new TokenRefreshException(token.getToken(), "Refresh token was expired. Please make a new signin request");
    return token;
  public int deleteByUserId(Long userId) {
    return refreshTokenRepository.deleteByUser(userRepository.findById(userId).get());

Handle Token Refresh Exception

Now we need to create TokenRefreshException class that extends RuntimeException.


package com.bezkoder.spring.security.jwt.exception;
import org.springframework.http.HttpStatus;
import org.springframework.web.bind.annotation.ResponseStatus;
public class TokenRefreshException extends RuntimeException {
  private static final long serialVersionUID = 1L;
  public TokenRefreshException(String token, String message) {
    super(String.format("Failed for [%s]: %s", token, message));

Let’s do the final step. We’re gonna create a RestControllerAdvice.


package com.bezkoder.spring.security.jwt.advice;
import java.util.Date;
import org.springframework.http.HttpStatus;
import org.springframework.web.bind.annotation.ExceptionHandler;
import org.springframework.web.bind.annotation.ResponseStatus;
import org.springframework.web.bind.annotation.RestControllerAdvice;
import org.springframework.web.context.request.WebRequest;
import com.bezkoder.spring.security.jwt.exception.TokenRefreshException;
public class TokenControllerAdvice {
  @ExceptionHandler(value = TokenRefreshException.class)
  public ErrorMessage handleTokenRefreshException(TokenRefreshException ex, WebRequest request) {
    return new ErrorMessage(
        new Date(),

For more details about RestControllerAdvice, please visit:
@RestControllerAdvice example in Spring Boot



Today we’ve learned a more interesting thing about JWT Refresh Token in a Spring Boot example.
Despite we wrote a lot of code, I hope you will understand the overall idea of the application, and apply it in your project at ease.

The code in this post bases on previous article that you need to read first:
Spring Boot Token based Authentication with Spring Security & JWT

You can test this Rest API with:
– Axios Client: Axios Interceptors tutorial with Refresh Token example
– React Client:

– Vue Client:

– Angular Client:

For understanding the architecture deeply and grasp the overview more easier:
Spring Boot Architecture for JWT with Spring Security

You can also know how to deploy Spring Boot App on AWS (for free) with this tutorial.
Or Dockerize with :Docker Compose: Spring Boot and MySQL example

Happy learning! See you again.

Further Reading

More Practices:

Fullstack CRUD App:
Spring Boot + Vue.js example
Angular 8 + Spring Boot example
Angular 10 + Spring Boot example
Angular 11 + Spring Boot example
Angular 12 + Spring Boot example
React + Spring Boot example

JPA One To Many example with Hibernate and Spring Boot
JPA Many to Many example with Hibernate in Spring Boot

Source Code

You can find the complete source code for this tutorial on Github.

38 thoughts to “Spring Boot Refresh Token with JWT example”

  1. Thank you!
    This post is great, I’ve learned a lot from your posts, but can you write a post to share how vue handles jwt refresh?

  2. Thanks you for this great tutorial!!!

    It would great if you post an Angular tutorial with http interceptor using this Spring boot backend with refresh token.

    Thanks in advance

  3. If I refresh the Token many times, I will get multiple Tokens, and these Tokens are different but it can be all authentic. Does this need to delete the old Token or not? If needed, how can I delete it?

    1. Hi, I don’t think that Client implements the refresh Token that way :). Client should refresh it only when the access Token is expired.

  4. Hello,

    When I post to the /refreshToken endpoint the new access and refresh tokens are equal to the previous, shouldn’t they be different?

    1. Hi, only refresh token is the same as the previous 🙂

      Generally, the refresh token has a long time to live. You don’t need to create a new refresh token everytime a user makes a /refreshtoken request. It helps us to reduce cost of database query (we store refresh token on a table).

  5. Hello , thx u for the effort.
    Do you have any tutorial how can i use the refresh token from front-end ?

  6. Hi I am getting a 403 forbidden error when trying to access /refreshtoken?

    Do you have any Idea on the silly mistake I could have made?

    1. I was an idiot, feel free just to delete my comments!

      I forgot the getters and setters on the TokenRefreshResponse!

  7. Hello,
    Can you help me to test expired refresh token from front end using interceptors, I followed your tutorial to make authentication with angular8 but I’m not able to change the function canActivate.

  8. Hi ,
    Please if i want to refresh token with another method , and i want to decrease the backwards and forwards on the server by pushing notification to the front automatically when the token is expired , So thanks a lot if you write a tutorial and explain this when having time 😀

  9. Hi, I really appreciated your project!!
    I made some changes on the code. I used Lombok not to write all the getters, setters and constructors.
    Regarding the logout api, I think you should use a private route, to avoid guests / unauthorized people to invalidate other users’ refresh token.

    Thank you very much!

  10. Hi,
    I’m new to JWT. Can anyone tell me if the below line of code really needed as I’m getting error 403 when the token is expired and deleted from the database

  11. Hi,

    your posts are very very helpful; thank you for sharing your experience and giving us the time you spent learning certain concepts.

    Regarding the management of the refreshtoken expiration, I would have returned a 401 to send the user back to a new authentication; but that’s just my opinion.

    As for the logout API, I would add a check to verify that the specified user matches the authenticated one, to prevent other users’ refreshtokens from being deleted.
    But I think it is a detail outside the concepts that you wanted to expose with this tutorial

  12. hello,
    i dont know why did u use @OneToOne relationship ? because we store the token in DB everytime if the token is expired or if authorization is not respected.
    so in DB for one user we have “N” Token

    1. Hi, if the token is expired, we remove it from database. You can read verifyExpiration() function in RefreshTokenService service.

  13. Hye,

    Great post. So when you refreshed the token, I don’t see you saving it back to the Database why not?
    String token = jwtUtils.generateTokenFromUsername(user.getUsername());
    return ResponseEntity.ok(new TokenRefreshResponse(token, requestRefreshToken));

    So you generated a new token and return it immediately. This implies that the new token doesn’t exist in the DB.

      1. What do you mean? Jwts, calls the `Save` method behind the hood and persist the new token to the Database?

        Please explain further.

        1. Ah no, JWT gives you the advantage that we don’t need to check the Token in database, because we can just use cryptography to verify that the token is legitimate or not.

  14. Where are ErrorMessage used in TokenControlAdvice and refreshTokenRepository.deleteByUser used in RefreshTokenService defined?

  15. Hi, why would RefreshToken entity class need the ID? Isn’t it just taking database space, because user_id will be unique itself in that table, so could it be used as primary key? Thanks.

Leave a Reply

Your email address will not be published.