How to Impersonate a User
Sometimes, it's useful to be able to switch from one user to another without having to log out and log in again (for instance when you are debugging something a user sees that you can't reproduce).
Caution
User impersonation is not compatible with some authentication mechanisms
(e.g. REMOTE_USER
) where the authentication information is expected to be
sent on each request.
Impersonating the user can be done by activating the switch_user
firewall
listener:
1 2 3 4 5 6 7 8
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
switch_user: true
To switch to another user, add a query string with the _switch_user
parameter and the username (or whatever field our user provider uses to load users)
as the value to the current URL:
1
http://example.com/somewhere?_switch_user=thomas
Tip
You can leverage the Twig function impersonation_path('thomas')
Tip
Instead of adding a _switch_user
query string parameter, you can pass
the username in a custom HTTP header by adjusting the parameter
setting.
For example, to use X-Switch-User
header (available in PHP as
HTTP_X_SWITCH_USER
) add this configuration:
1 2 3 4 5 6 7
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
switch_user: { parameter: X-Switch-User }
To switch back to the original user, use the special _exit
username:
1
http://example.com/somewhere?_switch_user=_exit
Tip
You can leverage the Twig function impersonation_exit_path('/somewhere')
This feature is only available to users with a special role called ROLE_ALLOWED_TO_SWITCH
.
Using role_hierarchy is a great way to give this
role to the users that need it.
Knowing When Impersonation Is Active
You can use the special attribute IS_IMPERSONATOR
to check if the
impersonation is active in this session. Use this special role, for
instance, to show a link to exit impersonation in a template:
1 2 3
{% if is_granted('IS_IMPERSONATOR') %}
<a href="{{ impersonation_exit_path(path('homepage')) }}">Exit impersonation</a>
{% endif %}
Finding the Original User
In some cases, you may need to get the object that represents the impersonator
user rather than the impersonated user. When a user is impersonated the token
stored in the token storage will be a SwitchUserToken
instance. Use the
following snippet to obtain the original token which gives you access to
the impersonator user:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
// src/Service/SomeService.php
namespace App\Service;
use Symfony\Bundle\SecurityBundle\Security;
use Symfony\Component\Security\Core\Authentication\Token\SwitchUserToken;
// ...
class SomeService
{
public function __construct(
private Security $security,
) {
}
public function someMethod(): void
{
// ...
$token = $this->security->getToken();
if ($token instanceof SwitchUserToken) {
$impersonatorUser = $token->getOriginalToken()->getUser();
}
// ...
}
}
Controlling the Query Parameter
This feature needs to be available only to a restricted group of users.
By default, access is restricted to users having the ROLE_ALLOWED_TO_SWITCH
role. The name of this role can be modified via the role
setting. You can
also adjust the query parameter name via the parameter
setting:
1 2 3 4 5 6 7 8
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
switch_user: { role: ROLE_ADMIN, parameter: _want_to_be_this_user }
Redirecting to a Specific Target Route
Note
It works only in a stateful firewall.
This feature allows you to control the redirection target route via target_route
.
1 2 3 4 5 6 7 8
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
switch_user: { target_route: app_user_dashboard }
Limiting User Switching
If you need more control over user switching, you can use a security voter. First,
configure switch_user
to check for some new, custom attribute. This can be
anything, but cannot start with ROLE_
(to enforce that only your voter will
be called):
1 2 3 4 5 6 7 8
# config/packages/security.yaml
security:
# ...
firewalls:
main:
# ...
switch_user: { role: CAN_SWITCH_USER }
Then, create a voter class that responds to this role and includes whatever custom logic you want:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
// src/Security/Voter/SwitchToCustomerVoter.php
namespace App\Security\Voter;
use Symfony\Bundle\SecurityBundle\Security;
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
use Symfony\Component\Security\Core\Authorization\AccessDecisionManagerInterface;
use Symfony\Component\Security\Core\Authorization\Voter\Voter;
use Symfony\Component\Security\Core\User\UserInterface;
class SwitchToCustomerVoter extends Voter
{
public function __construct(
private AccessDecisionManager $accessDecisionManager,
) {
}
protected function supports($attribute, $subject): bool
{
return in_array($attribute, ['CAN_SWITCH_USER'])
&& $subject instanceof UserInterface;
}
protected function voteOnAttribute($attribute, $subject, TokenInterface $token): bool
{
$user = $token->getUser();
// if the user is anonymous or if the subject is not a user, do not grant access
if (!$user instanceof UserInterface || !$subject instanceof UserInterface) {
return false;
}
// you can still check for ROLE_ALLOWED_TO_SWITCH
if ($this->accessDecisionManager->decide($token, ['ROLE_ALLOWED_TO_SWITCH'])) {
return true;
}
// check for any roles you want
if ($this->accessDecisionManager->decide($token, ['ROLE_TECH_SUPPORT'])) {
return true;
}
/*
* or use some custom data from your User object
if ($user->isAllowedToSwitch()) {
return true;
}
*/
return false;
}
}
That's it! When switching users, your voter now has full control over whether or not this is allowed. If your voter isn't called, see How to Use Voters to Check User Permissions.
Events
the security.switch_user
event is dispatched just before the impersonation
is fully completed. Your listener or subscriber will
receive a SwitchUserEvent,
which you can use to get the user that you are now impersonating.
This event is also dispatched just before impersonation is fully exited. You can use it to get the original impersonator user.
The Sessions section does not update the locale when you impersonate a user. If you do want to be sure to update the locale when you switch users, add an event subscriber on this event:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
// src/EventListener/SwitchUserSubscriber.php
namespace App\EventListener;
use Symfony\Component\EventDispatcher\EventSubscriberInterface;
use Symfony\Component\Security\Http\Event\SwitchUserEvent;
use Symfony\Component\Security\Http\SecurityEvents;
class SwitchUserSubscriber implements EventSubscriberInterface
{
public function onSwitchUser(SwitchUserEvent $event): void
{
$request = $event->getRequest();
if ($request->hasSession() && ($session = $request->getSession())) {
$session->set(
'_locale',
// assuming your User has some getLocale() method
$event->getTargetUser()->getLocale()
);
}
}
public static function getSubscribedEvents(): array
{
return [
// constant for security.switch_user
SecurityEvents::SWITCH_USER => 'onSwitchUser',
];
}
}
That's it! If you're using the default services.yaml configuration,
Symfony will automatically discover your service and call onSwitchUser
whenever
a switch user occurs.
For more details about event subscribers, see Events and Event Listeners.