This sample demonstrates how to use Auth0 to perform authentication using the Auth0 Java MVC Commons library. Download or clone this repository and follow the instructions below to configure and run the application.
To learn more about the Auth0 Java MVC Commons library, refer to the project's documentation.
- On the Auth0 Dashboard, click CREATE APPLICATION, provide a name for your Application, select Regular Web Application, and click Create
- Go to the Settings tab of your Application
- Add the URL
https://localhost:3000/callback
to the Allowed Callback URLs field - Add the URL
https://localhost:3000
to the Allowed Logout URLs field - Click SAVE CHANGES
- The
Domain
,Client ID
, andClient Secret
values will be used next to configure the Java application
Copy src/main/resources/auth0.properties.example
to src/main/resources/auth0.properties
:
cp src/main/resources/auth0.properties.example src/main/resources/auth0.properties
Set the client values in the src/main/resources/auth0.properties
file:
com.auth0.domain: {YOUR_AUTH0_DOMAIN}
com.auth0.clientId: {YOUR_AUTH0_CLIENT_ID}
com.auth0.clientSecret: {YOUR_AUTH0_CLIENT_SECRET}
Open a terminal, go to the project root directory and run the following command:
./gradlew clean bootRun
If you are using a Windows environment, execute:
gradlew clean bootRun
The server will be accessible on https://localhost:3000/portal/home. After logging in you should see the token
in the header.
In order to run the example with docker you need to have docker
installed. Check out docker documentation for installation guide.
You also need to set the client values as explained previously.
Execute in command line sh exec.sh
to run the Docker in Linux or MacOS, or .\exec.ps1
to run the Docker in Windows.
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
Auth0 helps you to:
- Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
- Add authentication through more traditional username/password databases.
- Add support for linking different user accounts with the same user.
- Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
- Analytics of how, when and where users are logging in.
- Pull data from other sources and add it to the user profile, through JavaScript rules.
- Go to Auth0 and click Sign Up.
- Use Google, GitHub or Microsoft Account to login.
If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.
This project is licensed under the MIT license. See the LICENCE file for more info.