Skip to content
i18n in Java 11, Spring Boot, and JavaScript
Java HTML CSS
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.mvn/wrapper
custom-login
src
.gitignore
Hello.java
LICENSE
README.md
demo.adoc
messages_en_US.properties
messages_es.properties
mvnw
mvnw.cmd
pom.xml

README.md

i18n in Java 11, Spring Boot, and JavaScript

This example shows how to do i18n in Java 11, Spring Boot, and JavaScript. Please read i18n in Java 11, Spring Boot, and JavaScript to see how this example was created.

Prerequisites: Java 11.

Okta has Authentication and User Management APIs that reduce development time with instant-on, scalable user infrastructure. Okta's intuitive API and expert support make it easy for developers to authenticate, manage, and secure users and roles in any application.

Getting Started

To install this example, run the following commands:

git clone https://github.com/oktadeveloper/okta-java-i18n-example.git
cd okta-java-i18n-example

Run the basic example with English.

java Hello.java

Or Spanish:

java Hello.java es

There's also a Spring Boot example, and a custom-login example you can read more about in the blog post.

To run the custom-login example, you'll need to create an account and OIDC app on Okta.

Create an Application in Okta

Log in to your Okta Developer account (or sign up if you don’t have an account).

  1. From the Applications page, choose Add Application.
  2. On the Create New Application page, select Web.
  3. Give your app a memorable name, then click Done.

Copy your issuer (found under API > Authorization Servers), client ID, and client secret into custom-login/src/main/resources/application.yml as follows:

okta:
  oauth2:
    issuer: https://{yourOktaDomain}/oauth2/default
    client-id: {yourClientID}
    client-secret: {yourClientSecret}

NOTE: The value of {yourOktaDomain} should be something like dev-123456.okta.com. Make sure you don't include -admin in the value!

After modifying this file, start the custom-login app and you should be able to authenticate with Okta.

Links

This example uses the following open source libraries:

Help

Please post any questions as comments on the blog post, or on the Okta Developer Forums.

License

Apache 2.0, see LICENSE.

You can’t perform that action at this time.