Security
Warning: You are browsing the documentation for Symfony 4.x, which is no longer maintained.
Read the updated version of this page for Symfony 7.1 (the current stable version).
Screencast
Do you prefer video tutorials? Check out the Symfony Security screencast series.
Symfony's security system is incredibly powerful, but it can also be confusing to set up. Don't worry! In this article, you'll learn how to set up your app's security system step-by-step:
- Installing security support;
- Create your User Class;
- Authentication & Firewalls;
- Denying access to your app (authorization);
- Fetching the current User object.
A few other important topics are discussed after.
1) Installation
In applications using Symfony Flex, run this command to install the security feature before using it:
1
$ composer require symfony/security-bundle
2a) Create your User Class
No matter how you will authenticate (e.g. login form or API tokens) or where your user data will be stored (database, single sign-on), the next step is always the same: create a "User" class. The easiest way is to use the MakerBundle.
Let's assume that you want to store your user data in the database with Doctrine:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
$ php bin/console make:user
The name of the security user class (e.g. User) [User]:
> User
Do you want to store user data in the database (via Doctrine)? (yes/no) [yes]:
> yes
Enter a property name that will be the unique "display" name for the user (e.g.
email, username, uuid [email]
> email
Does this app need to hash/check user passwords? (yes/no) [yes]:
> yes
created: src/Entity/User.php
created: src/Repository/UserRepository.php
updated: src/Entity/User.php
updated: config/packages/security.yaml
That's it! The command asks several questions so that it can generate exactly what
you need. The most important is the User.php
file itself. The only rule about
your User
class is that it must implement UserInterface.
Feel free to add any other fields or logic you need. If your User
class is
an entity (like in this example), you can use the make:entity command
to add more fields. Also, make sure to make and run a migration for the new entity:
1 2
$ php bin/console make:migration
$ php bin/console doctrine:migrations:migrate
2b) The "User Provider"
In addition to your User
class, you also need a "User provider": a class that
helps with a few things, like reloading the User data from the session and some
optional features, like remember me and
impersonation.
Fortunately, the make:user
command already configured one for you in your
security.yaml
file under the providers
key:
1 2 3 4 5 6 7 8 9 10
# config/packages/security.yaml
security:
# ...
providers:
# used to reload user from session & other features (e.g. switch_user)
app_user_provider:
entity:
class: App\Entity\User
property: email
If your User
class is an entity, you don't need to do anything else. But if
your class is not an entity, then make:user
will also have generated a
UserProvider
class that you need to finish. Learn more about user providers
here: User Providers.
2c) Encoding Passwords
Not all applications have "users" that need passwords. If your users have passwords,
you can control how those passwords are encoded in security.yaml
. The make:user
command will pre-configure this for you:
1 2 3 4 5 6 7 8 9 10 11
# config/packages/security.yaml
security:
# ...
encoders:
# use your user class name here
App\Entity\User:
# Use native password encoder
# This value auto-selects the best possible hashing algorithm
# (i.e. Sodium when available).
algorithm: auto
Now that Symfony knows how you want to encode the passwords, you can use the
UserPasswordEncoderInterface
service to do this before saving your users to
the database.
For example, by using DoctrineFixturesBundle, you can create dummy database users:
1 2 3 4
$ php bin/console make:fixtures
The class name of the fixtures to create (e.g. AppFixtures):
> UserFixtures
Use this service to encode the passwords:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
// src/DataFixtures/UserFixtures.php
+ use Symfony\Component\Security\Core\Encoder\UserPasswordEncoderInterface;
// ...
class UserFixtures extends Fixture
{
+ private $passwordEncoder;
+ public function __construct(UserPasswordEncoderInterface $passwordEncoder)
+ {
+ $this->passwordEncoder = $passwordEncoder;
+ }
public function load(ObjectManager $manager)
{
$user = new User();
// ...
+ $user->setPassword($this->passwordEncoder->encodePassword(
+ $user,
+ 'the_new_password'
+ ));
// ...
}
}
You can manually encode a password by running:
1
$ php bin/console security:encode-password
3a) Authentication & Firewalls
The security system is configured in config/packages/security.yaml
. The most
important section is firewalls
:
1 2 3 4 5 6 7 8
# config/packages/security.yaml
security:
firewalls:
dev:
pattern: ^/(_(profiler|wdt)|css|images|js)/
security: false
main:
anonymous: lazy
4.4
The lazy
anonymous mode has been introduced in Symfony 4.4.
A "firewall" is your authentication system: the configuration below it defines how your users will be able to authenticate (e.g. login form, API token, etc).
Only one firewall is active on each request: Symfony uses the pattern
key
to find the first match (you can also match by host or other things).
The dev
firewall is really a fake firewall: it makes sure that you don't
accidentally block Symfony's dev tools - which live under URLs like /_profiler
and /_wdt
.
All real URLs are handled by the main
firewall (no pattern
key means
it matches all URLs). A firewall can have many modes of authentication,
in other words, it enables many ways to ask the question "Who are you?". Often, the
user is unknown (i.e. not logged in) when they first visit your website. The
anonymous
mode, if enabled, is used for these requests.
In fact, if you go to the homepage right now, you will have access and you'll
see that you're "authenticated" as anon.
. The firewall verified that it
does not know your identity, and so, you are anonymous:
It means any request can have an anonymous token to access some resource, while some actions (i.e. some pages or buttons) can still require specific privileges. A user can then access a form login without being authenticated as a unique user (otherwise an infinite redirection loop would happen asking the user to authenticate while trying to do so).
You'll learn later how to deny access to certain URLs, controllers, or part of templates.
Tip
The lazy
anonymous mode prevents the session from being started if
there is no need for authorization (i.e. explicit check for a user
privilege). This is important to keep requests cacheable (see
HTTP Cache).
Note
If you do not see the toolbar, install the profiler with:
1
$ composer require --dev symfony/profiler-pack
Now that we understand our firewall, the next step is to create a way for your users to authenticate!
3b) Authenticating your Users
Authentication in Symfony can feel a bit "magic" at first. That's because, instead of building a route & controller to handle login, you'll activate an authentication provider: some code that runs automatically before your controller is called.
Symfony has several built-in authentication providers. If your use-case matches one of these exactly, great! But, in most cases - including a login form - we recommend building a Guard Authenticator: a class that allows you to control every part of the authentication process (see the next section).
Tip
If your application logs users in via a third-party service such as Google, Facebook or Twitter (social login), check out the HWIOAuthBundle community bundle.
Guard Authenticators
A Guard authenticator is a class that gives you complete control over your authentication process. There are many different ways to build an authenticator; here are a few common use-cases:
- How to Build a Login Form
- Custom Authentication System with Guard (API Token Example) – see this for the most detailed description of authenticators and how they work
4) Denying Access, Roles and other Authorization
Users can now log in to your app using your login form. Great! Now, you need to learn how to deny access and work with the User object. This is called authorization, and its job is to decide if a user can access some resource (a URL, a model object, a method call, ...).
The process of authorization has two different sides:
- The user receives a specific set of roles when logging in (e.g.
ROLE_ADMIN
). - You add code so that a resource (e.g. URL, controller) requires a specific
"attribute" (most commonly a role like
ROLE_ADMIN
) in order to be accessed.
Roles
When a user logs in, Symfony calls the getRoles()
method on your User
object to determine which roles this user has. In the User
class that we
generated earlier, the roles are an array that's stored in the database, and
every user is always given at least one role: ROLE_USER
:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
// src/Entity/User.php
// ...
class User
{
/**
* @ORM\Column(type="json")
*/
private $roles = [];
// ...
public function getRoles(): array
{
$roles = $this->roles;
// guarantee every user at least has ROLE_USER
$roles[] = 'ROLE_USER';
return array_unique($roles);
}
}
This is a nice default, but you can do whatever you want to determine which roles a user should have. Here are a few guidelines:
- Every role must start with
ROLE_
(otherwise, things won't work as expected) - Other than the above rule, a role is just a string and you can invent what you
need (e.g.
ROLE_PRODUCT_ADMIN
).
You'll use these roles next to grant access to specific sections of your site. You can also use a role hierarchy where having some roles automatically give you other roles.
Add Code to Deny Access
There are two ways to deny access to something:
- access_control in security.yaml
allows you to protect URL patterns (e.g.
/admin/*
). Simpler, but less flexible; - in your controller (or other code).
Securing URL patterns (access_control)
The most basic way to secure part of your app is to secure an entire URL pattern
in security.yaml
. For example, to require ROLE_ADMIN
for all URLs that
start with /admin
, you can:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
# config/packages/security.yaml
security:
# ...
firewalls:
# ...
main:
# ...
access_control:
# require ROLE_ADMIN for /admin*
- { path: '^/admin', roles: ROLE_ADMIN }
# or provide an expression for /admin* (e.g. to require multiple roles)
- { path: '^/admin', roles: 'is_granted("IS_AUTHENTICATED_FULLY") and is_granted("ROLE_ADMIN")' }
# the 'path' value can be any valid regular expression
# (this one will match URLs like /api/post/7298 and /api/comment/528491)
- { path: ^/api/(post|comment)/\d+$, roles: ROLE_USER }
You can define as many URL patterns as you need - each is a regular expression. BUT, only one will be matched per request: Symfony starts at the top of the list and stops when it finds the first match:
1 2 3 4 5 6 7 8 9 10
# config/packages/security.yaml
security:
# ...
access_control:
# matches /admin/users/*
- { path: '^/admin/users', roles: ROLE_SUPER_ADMIN }
# matches /admin/* except for anything matching the above rule
- { path: '^/admin', roles: ROLE_ADMIN }
Prepending the path with ^
means that only URLs beginning with the
pattern are matched. For example, a path of /admin
(without the ^
)
would match /admin/foo
but would also match URLs like /foo/admin
.
Each access_control
can also match on IP address, hostname and HTTP methods.
It can also be used to redirect a user to the https
version of a URL pattern.
See How Does the Security access_control Work?.
Securing Controllers and other Code
You can deny access from inside a controller:
1 2 3 4 5 6 7 8 9 10
// src/Controller/AdminController.php
// ...
public function adminDashboard(): Response
{
$this->denyAccessUnlessGranted('ROLE_ADMIN');
// or add an optional message - seen by developers
$this->denyAccessUnlessGranted('ROLE_ADMIN', null, 'User tried to access a page without having ROLE_ADMIN');
}
That's it! If access is not granted, a special AccessDeniedException is thrown and no more code in your controller is called. Then, one of two things will happen:
- If the user isn't logged in yet, they will be asked to log in (e.g. redirected to the login page).
- If the user is logged in, but does not have the
ROLE_ADMIN
role, they'll be shown the 403 access denied page (which you can customize).
Thanks to the SensioFrameworkExtraBundle, you can also secure your controller using annotations:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
// src/Controller/AdminController.php
// ...
+ use Sensio\Bundle\FrameworkExtraBundle\Configuration\IsGranted;
+ /**
+ * Require ROLE_ADMIN for *every* controller method in this class.
+ *
+ * @IsGranted("ROLE_ADMIN")
+ */
class AdminController extends AbstractController
{
+ /**
+ * Require ROLE_ADMIN for only this controller method.
+ *
+ * @IsGranted("ROLE_ADMIN")
+ */
public function adminDashboard(): Response
{
// ...
}
}
For more information, see the FrameworkExtraBundle documentation.
Access Control in Templates
If you want to check if the current user has a certain role, you can use
the built-in is_granted()
helper function in any Twig template:
1 2 3
{% if is_granted('ROLE_ADMIN') %}
<a href="...">Delete</a>
{% endif %}
Setting Individual User Permissions
Most applications require more specific access rules. For instance, a user should be able to only edit their own comments on a blog. Voters allow you to write whatever business logic you need to determine access. Using these voters is similar to the role-based access checks implemented in the previous chapters. Read How to Use Voters to Check User Permissions to learn how to implement your own voter.
Checking to see if a User is Logged In (IS_AUTHENTICATED_FULLY)
If you only want to check if a user is logged in (you don't care about roles), you have the following two options.
Firstly, if you've given every user ROLE_USER
, you can check for that role.
Secondly, you can use a special "attribute" in place of a role:
1 2 3 4 5 6 7 8
// ...
public function adminDashboard(): Response
{
$this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY');
// ...
}
You can use IS_AUTHENTICATED_FULLY
anywhere roles are used: like
access_control
or in Twig.
IS_AUTHENTICATED_FULLY
isn't a role, but it kind of acts like one, and every
user that has logged in will have this. Actually, there are 3 special attributes
like this:
IS_AUTHENTICATED_REMEMBERED
: All logged in users have this, even if they are logged in because of a "remember me cookie". Even if you don't use the remember me functionality, you can use this to check if the user is logged in.IS_AUTHENTICATED_FULLY
: This is similar toIS_AUTHENTICATED_REMEMBERED
, but stronger. Users who are logged in only because of a "remember me cookie" will haveIS_AUTHENTICATED_REMEMBERED
but will not haveIS_AUTHENTICATED_FULLY
.IS_AUTHENTICATED_ANONYMOUSLY
: All users (even anonymous ones) have this - this is useful when defining a list of URLs with no access restriction - some details are in How Does the Security access_control Work?.
5a) Fetching the User Object
After authentication, the User
object of the current user can be accessed
via the getUser()
shortcut:
1 2 3 4 5 6 7 8 9 10 11 12 13 14
public function index(): Response
{
// usually you'll want to make sure the user is authenticated first
$this->denyAccessUnlessGranted('IS_AUTHENTICATED_FULLY');
// returns your User object, or null if the user is not authenticated
// use inline documentation to tell your editor your exact User class
/** @var \App\Entity\User $user */
$user = $this->getUser();
// Call whatever methods you've added to your User class
// For example, if you added a getFirstName() method, you can use that.
return new Response('Well hi there '.$user->getFirstName());
}
5b) Fetching the User from a Service
If you need to get the logged in user from a service, use the Security service:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
// src/Service/ExampleService.php
// ...
use Symfony\Component\Security\Core\Security;
class ExampleService
{
private $security;
public function __construct(Security $security)
{
// Avoid calling getUser() in the constructor: auth may not
// be complete yet. Instead, store the entire Security object.
$this->security = $security;
}
public function someMethod()
{
// returns User object or null if not authenticated
$user = $this->security->getUser();
// ...
}
}
Fetch the User in a Template
In a Twig Template the user object is available via the app.user
variable
thanks to the Twig global app variable:
1 2 3
{% if is_granted('IS_AUTHENTICATED_FULLY') %}
<p>Email: {{ app.user.email }}</p>
{% endif %}
Logging Out
To enable logging out, activate the logout
config parameter under your firewall:
1 2 3 4 5 6 7 8 9 10 11 12
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
logout:
path: app_logout
# where to redirect after logout
# target: app_any_route
Next, you'll need to create a route for this URL (but not a controller):
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
// src/Controller/SecurityController.php
namespace App\Controller;
use Symfony\Bundle\FrameworkBundle\Controller\AbstractController;
use Symfony\Component\Routing\Annotation\Route;
class SecurityController extends AbstractController
{
/**
* @Route("/logout", name="app_logout", methods={"GET"})
*/
public function logout(): void
{
// controller can be blank: it will never be executed!
throw new \Exception('Don\'t forget to activate logout in security.yaml');
}
}
And that's it! By sending a user to the app_logout
route (i.e. to /logout
)
Symfony will un-authenticate the current user and redirect them.
Tip
Need more control of what happens after logout? Add a success_handler
key
under logout
and point it to a service id of a class that implements
LogoutSuccessHandlerInterface.
Hierarchical Roles
Instead of giving many roles to each user, you can define role inheritance rules by creating a role hierarchy:
1 2 3 4 5 6 7
# config/packages/security.yaml
security:
# ...
role_hierarchy:
ROLE_ADMIN: ROLE_USER
ROLE_SUPER_ADMIN: [ROLE_ADMIN, ROLE_ALLOWED_TO_SWITCH]
Users with the ROLE_ADMIN
role will also have the
ROLE_USER
role. And users with ROLE_SUPER_ADMIN
, will automatically have
ROLE_ADMIN
, ROLE_ALLOWED_TO_SWITCH
and ROLE_USER
(inherited from ROLE_ADMIN
).
For role hierarchy to work, do not try to call $user->getRoles()
manually.
For example, in a controller extending from the base controller:
1 2 3 4 5 6
// BAD - $user->getRoles() will not know about the role hierarchy
$hasAccess = in_array('ROLE_ADMIN', $user->getRoles());
// GOOD - use of the normal security methods
$hasAccess = $this->isGranted('ROLE_ADMIN');
$this->denyAccessUnlessGranted('ROLE_ADMIN');
Note
The role_hierarchy
values are static - you can't, for example, store the
role hierarchy in a database. If you need that, create a custom
security voter that looks for the user roles
in the database.
Frequently Asked Questions
- Can I have Multiple Firewalls?
- Yes! But it's usually not necessary. Each firewall is like a separate security system. And so, unless you have very different authentication needs, one firewall usually works well. With Guard authentication, you can create various, diverse ways of allowing authentication (e.g. form login, API key authentication and LDAP) all under the same firewall.
- Can I Share Authentication Between Firewalls?
- Yes, but only with some configuration. If you're using multiple firewalls and you authenticate against one firewall, you will not be authenticated against any other firewalls automatically. Different firewalls are like different security systems. To do this you have to explicitly specify the same Security Configuration Reference (SecurityBundle) for different firewalls. However, one main firewall is usually sufficient for the needs of most applications.
- Security doesn't seem to work on my Error Pages
- As routing is done before security, 404 error pages are not covered by any firewall. This means you can't check for security or even access the user object on these pages. See How to Customize Error Pages for more details.
- My Authentication Doesn't Seem to Work: No Errors, but I'm Never Logged In
-
Sometimes authentication may be successful, but after redirecting, you're
logged out immediately due to a problem loading the
User
from the session. To see if this is an issue, check your log file (var/log/dev.log
) for the log message: - Cannot refresh token because user has changed
- If you see this, there are two possible causes. First, there may be a problem loading your User from the session. See Security User Providers. Second, if certain user information was changed in the database since the last page refresh, Symfony will purposely log out the user for security reasons.
Learn More
Authentication (Identifying/Logging in the User)
- How to Build a Login Form
- How to Add a Reset Password Feature
- How to Build a JSON Authentication Endpoint
- Custom Authentication System with Guard (API Token Example)
- How to Migrate a Password Hash
- Built-in Authentication Providers
- Security User Providers
- Authenticating against an LDAP server
- How to Add "Remember Me" Login Functionality
- How to Impersonate a User
- How to Create and Enable Custom User Checkers
- How to Use A Different Password Encoder Algorithm Per User
- How to Use Multiple Guard Authenticators
- How to Restrict Firewalls to a Request
- How to Implement CSRF Protection
- How to Create a custom Authentication Provider
Authorization (Denying Access)
- How to Use Voters to Check User Permissions
- How to Secure any Service or Method in your Application
- How Does the Security access_control Work?
- Using Expressions in Security Access Controls
- How to Customize Access Denied Responses
- How to Use Access Control Lists (ACLs)
- How to Force HTTPS or HTTP for different URLs