Make sure Composer is installed globally, as explained in the installation chapter of the Composer documentation.
Open a command console, enter your project directory and execute:
$ composer require halloverden/symfony-security-bundle
Open a command console, enter your project directory and execute the following command to download the latest stable version of this bundle:
$ composer require alloverden/symfony-security-bundle
Then, enable the bundle by adding it to the list of registered bundles
in the config/bundles.php
file of your project:
// config/bundles.php
return [
// ...
HalloVerden\SecurityBundle\HalloVerdenSecurityBundle::class => ['all' => true],
];
Authenticators can be used to allow authentication with an access token from your OpenID provider.
- Create a class that implements
HalloVerden\Security\Interfaces\OauthUserProviderServiceInterface
- Enable authenticators and the class you want to use as services
HalloVerden\Security\Interfaces\OauthUserProviderServiceInterface: class: App\Services\OauthUserProviderService # Your class HalloVerden\Security\AccessTokenAuthenticator: ~ HalloVerden\Security\ClientCredentialsAccessTokenAuthenticator: ~
- Add authenticators to your security config.
guard: authenticators: - HalloVerden\Security\AccessTokenAuthenticator entry_point: HalloVerden\Security\AccessTokenAuthenticator
- You also need services that implements
HalloVerden\Security\Interfaces\OauthTokenProviderServiceInterface
andHalloVerden\Security\Interfaces\OauthJwkSetProviderServiceInterface
( this can be skipped when using halloverden/symfony-oidc-client-bundle )
Create a yaml file for each entity that needs to have a access definition. Example:
App\Entity\Requests\TestRequest:
canCreate:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.create:test-request'
canRead:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.read:test-request'
canUpdate:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.update:test-request'
canDelete:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.delete:test-request'
properties:
test:
canRead:
roles:
- 'ROLE_USER'
scopes:
- 'system.read:test-request.test'
canWrite:
roles:
- 'ROLE_USER'
scopes:
- 'system.write:test-request.test'
yoo:
canWrite:
roles:
- 'ROLE_USER'
Add the path for this access definition in the config file:
hallo_verden_security:
access_definitions:
dirs:
App\Entity\Requests: '%kernel.project_dir%/config/access_definitions/requests'
You can use AccessDefinableExclusionStrategy
to skip properties the user does not have access too on serializing the deserializing.
There is also the HasAccess
validator constraint that can check if user have access to specific property.
In any other case you can use AccessDefinitionService
to check access for specific class/property.