This repository has been archived on 2023-08-20. You can view files and clone it, but cannot push or open issues or pull requests.
symfony/src/Symfony/Component/Security
Nicolas Grekas 7bba83d3d7 Merge branch '3.2'
* 3.2:
  [Cache] Fix Redis pipelining/multi-ops
  [Yaml] Fix the tests
  [github] Add a reminder about CHANGELOG.md files
  respect the umask argument in dumpFile()
  dumpFile(), preserve existing file permissions
  [Form] Fixed overridden choices option in extended choice types
  Add validate method to mockec validator in form TypeTestCase
  bumped Symfony version to 2.8.19
  updated VERSION for 2.8.18
  updated CHANGELOG for 2.8.18
  bumped Symfony version to 2.7.26
  updated VERSION for 2.7.25
  update CONTRIBUTORS for 2.7.25
  updated CHANGELOG for 2.7.25
  [HttpKernel] fixed Kernel name when stored in a directory starting with a number
  context listener: hardening user provider handling
  [Console] Do not squash input changes made from console.command event
2017-03-07 17:28:52 +01:00
..
Core Merge branch '2.7' into 2.8 2017-03-02 13:33:27 -08:00
Csrf Merge branch '3.2' 2017-02-18 18:35:19 +01:00
Guard Merge branch '3.2' 2017-02-20 13:38:57 +01:00
Http Merge branch '3.2' 2017-03-07 17:28:52 +01:00
.gitignore
CHANGELOG.md Revert "feature #21792 [Security] deprecate multiple providers in context listener (xabbuh)" 2017-02-28 13:21:14 +01:00
composer.json feature #19822 [HttpKernel] Deprecate X-Status-Code for better alternative (jameshalsall) 2017-02-28 22:52:11 -08:00
LICENSE updated LICENSE year 2017-01-02 12:30:00 -08:00
phpunit.xml.dist Merge branch '2.3' into 2.7 2015-11-18 14:41:01 +01:00
README.md Updated all the README files 2016-03-04 08:12:06 +01:00

Security Component

The Security component provides a complete security system for your web application. It ships with facilities for authenticating using HTTP basic or digest authentication, interactive form login or X.509 certificate login, but also allows you to implement your own authentication strategies. Furthermore, the component provides ways to authorize authenticated users based on their roles, and it contains an advanced ACL system.

Resources