You are browsing the Symfony 4 documentation, which changes significantly from Symfony 3.x. If your app doesn't use Symfony 4 yet, browse the Symfony 3.4 documentation.
The Security Component
The Security Component¶
The Security component provides a complete security system for your web application. It ships with facilities for authenticating using HTTP basic authentication, interactive form login or X.509 certificate login, but also allows you to implement your own authentication strategies. Furthermore, the component provides ways to authorize authenticated users based on their roles.
$ composer require symfony/security
Alternatively, you can clone the https://github.com/symfony/security repository.
If you install this component outside of a Symfony application, you must
vendor/autoload.php file in your code to enable the class
autoloading mechanism provided by Composer. Read
this article for more details.
The Security component is divided into four smaller sub-components which can be used separately:
- It provides all the common security features, from authentication to authorization and from encoding passwords to loading users.
- It integrates the core sub-component with the HTTP protocol to handle HTTP requests and responses.
- It provides protection against CSRF attacks.
- The Firewall and Authorization
- Securely Generating Random Values
- How Does the Security access_control Work?
- How to Create a Custom Access Denied Handler
- How to Use Access Control Lists (ACLs)
- Built-in Authentication Providers
- How to Implement CSRF Protection
- How to Create a custom Authentication Provider
- How to Load Security Users from the Database (the Entity Provider)
- Security: Complex Access Controls with Expressions
- How to Restrict Firewalls to a Request
- How to Force HTTPS or HTTP for different URLs
- Using the form_login Authentication Provider
- How to Build a Login Form
- Custom Authentication System with Guard (API Token Example)
- How to Impersonate a User
- How to Build a JSON Authentication Endpoint
- Authenticating against an LDAP server
- How to Use Multiple Guard Authenticators
- How to Use A Different Password Encoder Algorithm Per User
- How to Add "Remember Me" Login Functionality
- How to Secure any Service or Method in your Application
- How to Check for Known Security Vulnerabilities in Your Dependencies
- How to Create and Enable Custom User Checkers
- All about User Providers
- How to Use Voters to Check User Permissions
- Security Configuration Reference (SecurityBundle)
This work, including the code samples, is licensed under a Creative Commons BY-SA 3.0 license.