This bundle provides a JWT authenticator for Symfony applications. It's using PHP JWT Framework for parsing and validating the JWT.
Make sure Composer is installed globally, as explained in the installation chapter of the Composer documentation.
Open a command console, enter your project directory and execute:
$ composer require halloverden/symfony-jwt-authenticator-bundleOpen a command console, enter your project directory and execute the following command to download the latest stable version of this bundle:
$ composer require halloverden/symfony-jwt-authenticator-bundleThen, enable the bundle by adding it to the list of registered bundles
in the config/bundles.php file of your project:
// config/bundles.php
return [
// ...
HalloVerden\JwtAuthenticatorBundle\HalloVerdenJwtAuthenticatorBundle::class => ['all' => true],
];The authenticator is enabled and configured in the security config.
example config:
# config/packages/security.yaml
security:
# ...
firewalls:
main:
hallo_verden_jwt:
provider: 'user_provider'
failure_handler: ~
token:
key_set: 'my_key_set'
jws_loader: 'hallo_verden_default'
claim_checker: 'hallo_verden_default'
mandatory_claims: []
user_identifier_claim: 'sub'
token_extractor: 'hallo_verden.token_extractor.bearer'You need to provide a key set.
See PHP JWT Framework for how to provide a key set.
There is a default JWS loader provided (hallo_verden_default), this loader is using the jws_compact serializer
and supports RS256 and HS256 signature algorithms.
See PHP JWT Framework for how to create your own loader.
There is a default claim checker provided (hallo_verden_default), this checker checks the exp, iat and nbf claims.
See PHP JWT Framework for how to create your own checker.
Here you specify the claims that need to be mandatory in your JWT.
The user_identifier_claim is automatically added as a mandatory claim.
This claim is sent to the user provider for retrieving the user.
The default extractor hallo_verden.token_extractor.bearer get the bearer token from the authorization header.
You can create your own extractor by implementing the TokenExtractorInterface
and set the service id to this option.
By default, the following response is sent on failure:
{
"error": "INVALID_TOKEN"
}You can modify this by creating a service implementing the AuthenticationFailureHandlerInterface and set the service id to this option.