Make sure Composer is installed globally, as explained in the installation chapter of the Composer documentation.
Open a command console, enter your project directory and execute:
$ composer require halloverden/symfony-security-bundleOpen a command console, enter your project directory and execute the following command to download the latest stable version of this bundle:
$ composer require alloverden/symfony-security-bundleThen, enable the bundle by adding it to the list of registered bundles
in the config/bundles.php file of your project:
// config/bundles.php
return [
// ...
HalloVerden\SecurityBundle\HalloVerdenSecurityBundle::class => ['all' => true],
];Authenticators can be used to allow authentication with an access token from your OpenID provider.
- Create a class that implements
HalloVerden\Security\Interfaces\OauthUserProviderServiceInterface - Enable authenticators and the class you want to use as services
HalloVerden\Security\Interfaces\OauthUserProviderServiceInterface: class: App\Services\OauthUserProviderService # Your class HalloVerden\Security\AccessTokenAuthenticator: ~ HalloVerden\Security\ClientCredentialsAccessTokenAuthenticator: ~
- Add authenticators to your security config.
guard: authenticators: - HalloVerden\Security\AccessTokenAuthenticator entry_point: HalloVerden\Security\AccessTokenAuthenticator
- You also need services that implements
HalloVerden\Security\Interfaces\OauthTokenProviderServiceInterfaceandHalloVerden\Security\Interfaces\OauthJwkSetProviderServiceInterface( this can be skipped when using halloverden/symfony-oidc-client-bundle )
Create a yaml file for each entity that needs to have a access definition. Example:
App\Entity\Requests\TestRequest:
canCreate:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.create:test-request'
canRead:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.read:test-request'
canUpdate:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.update:test-request'
canDelete:
roles:
- 'ROLE_ADMIN'
scopes:
- 'system.delete:test-request'
properties:
test:
canRead:
roles:
- 'ROLE_USER'
scopes:
- 'system.read:test-request.test'
canWrite:
roles:
- 'ROLE_USER'
scopes:
- 'system.write:test-request.test'
yoo:
canWrite:
roles:
- 'ROLE_USER'
Add the path for this access definition in the config file:
hallo_verden_security:
access_definitions:
dirs:
App\Entity\Requests: '%kernel.project_dir%/config/access_definitions/requests'You can use AccessDefinableExclusionStrategy to skip properties the user does not have access too on serializing the deserializing.
There is also the HasAccess validator constraint that can check if user have access to specific property.
In any other case you can use AccessDefinitionService to check access for specific class/property.