Skip to content

Latest commit

 

History

History
 
 

mvc-login

Spring Boot 2 Login - MVC

This sample demonstrates:

  • Adding authentication with Auth0 to a Spring Boot 2 MVC application
  • Accessing profile information of the authenticated user
  • Only allowing authenticated users to access certain resources

Configuration

Auth0 Dashboard

  1. On the Auth0 Dashboard create a new Application of type Regular Web Application.
  2. On the Settings tab of your application, add the URL http://localhost:3000/login/oauth2/code/auth0 to the Allowed Callback URLs field.
  3. On the Settings tab of your application, add the URL http://localhost:3000/ to the Allowed Logout URLs field.
  4. Save the changes to your application settings. Don't close this page; you'll need some of the settings when configuring the application below.

Application configuration

Copy src/main/resources/application.yml.example to src/main/resources/application.yml:

cp src/main/resources/application.yml.example src/main/resources/application.yml

Set the application values in the src/main/resources/application.yml file to the values of your Auth0 application.

client-id: {YOUR-CLIENT-ID}
client-secret: {YOUR-CLIENT-SECRET}
issuer-uri: https://{YOUR-DOMAIN}/

Running the sample

Open a terminal, go to the project root directory and run the following command:

Linux or MacOS:

./gradlew bootRun

Windows:

gradlew.bat bootRun 

The application will be accessible at http://localhost:3000.

Running the sample with docker

In order to run the example with Docker you need to have docker installed.

You also need to set the client values as explained previously.

Execute the command to run Docker for your environment:

Linux or MacOS:

sh exec.sh

Windows:

.\exec.ps1

The application will be accessible at http://localhost:3000.

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

What is Auth0?

Auth0 helps you to:

  • Add authentication with multiple authentication sources, either social like Google, Facebook, Microsoft Account, LinkedIn, GitHub, Twitter, Box, Salesforce, amont others, or enterprise identity systems like Windows Azure AD, Google Apps, Active Directory, ADFS or any SAML Identity Provider.
  • Add authentication through more traditional username/password databases.
  • Add support for linking different user accounts with the same user.
  • Support for generating signed Json Web Tokens to call your APIs and flow the user identity securely.
  • Analytics of how, when and where users are logging in.
  • Pull data from other sources and add it to the user profile, through JavaScript rules.

Create a free account in Auth0

  1. Go to Auth0 and click Sign Up.
  2. Use Google, GitHub or Microsoft Account to login.

Issue Reporting

If you have found a bug or if you have a feature request, please report them at this repository issues section. Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

Author

Auth0

License

This project is licensed under the MIT license. See the LICENSE file for more info.