Authentication for PHP. Simple, lightweight and secure.
Written once, to be used everywhere.
Completely framework-agnostic and database-agnostic.
- There are tons of websites with weak authentication systems. Don’t build such a site.
- Re-implementing a new authentication system for every PHP project is not a good idea.
- Building your own authentication classes piece by piece, and copying it to every project, is not recommended, either.
- A secure authentication system with an easy-to-use API should be thoroughly designed and planned.
- Peer-review for your critical infrastructure is a must.
- PHP 5.6.0+
- PDO (PHP Data Objects) extension (
pdo
)- MySQL Native Driver (
mysqlnd
) or PostgreSQL driver (pgsql
) or SQLite driver (sqlite
)
- MySQL Native Driver (
- OpenSSL extension (
openssl
)
- PDO (PHP Data Objects) extension (
- MySQL 5.5.3+ or MariaDB 5.5.23+ or PostgreSQL 9.5.10+ or SQLite 3.14.1+ or other SQL databases
-
Include the library via Composer [?]:
$ composer require delight-im/auth
-
Include the Composer autoloader:
require __DIR__ . '/vendor/autoload.php';
-
Set up a database and create the required tables:
Migrating from an earlier version of this project? See our upgrade guide for help.
- Creating a new instance
- Registration (sign up)
- Login (sign in)
- Email verification
- Keeping the user logged in
- Password reset (“forgot password”)
- Changing the current user’s password
- Changing the current user’s email address
- Re-sending confirmation requests
- Logout
- Accessing user information
- Reconfirming the user’s password
- Roles (or groups)
- Enabling or disabling password resets
- Throttling or rate limiting
- Administration (managing users)
- Cookies
- Utilities
- Reading and writing session data
// $db = new \PDO('mysql:dbname=my-database;host=localhost;charset=utf8mb4', 'my-username', 'my-password');
// or
// $db = new \PDO('pgsql:dbname=my-database;host=localhost;port=5432', 'my-username', 'my-password');
// or
// $db = new \PDO('sqlite:../Databases/my-database.sqlite');
// or
// $db = new \Delight\Db\PdoDsn('mysql:dbname=my-database;host=localhost;charset=utf8mb4', 'my-username', 'my-password');
// or
// $db = new \Delight\Db\PdoDsn('pgsql:dbname=my-database;host=localhost;port=5432', 'my-username', 'my-password');
// or
// $db = new \Delight\Db\PdoDsn('sqlite:../Databases/my-database.sqlite');
$auth = new \Delight\Auth\Auth($db);
If you have an open PDO
connection already, just re-use it. The database user (e.g. my-username
) needs at least the privileges SELECT
, INSERT
, UPDATE
and DELETE
for the tables used by this library (or their parent database).
If your web server is behind a proxy server and $_SERVER['REMOTE_ADDR']
only contains the proxy’s IP address, you must pass the user’s real IP address to the constructor in the second argument, which is named $ipAddress
. The default is the usual remote IP address received by PHP.
Should your database tables for this library need a common prefix, e.g. my_users
instead of users
(and likewise for the other tables), pass the prefix (e.g. my_
) as the third parameter to the constructor, which is named $dbTablePrefix
. This is optional and the prefix is empty by default.
During development, you may want to disable the request limiting or throttling performed by this library. To do so, pass false
to the constructor as the fourth argument, which is named $throttling
. The feature is enabled by default.
During the lifetime of a session, some user data may be changed remotely, either by a client in another session or by an administrator. That means this information must be regularly resynchronized with its authoritative source in the database, which this library does automatically. By default, this happens every five minutes. If you want to change this interval, pass a custom interval in seconds to the constructor as the fifth argument, which is named $sessionResyncInterval
.
If all your database tables need a common database name, schema name, or other qualifier that must be specified explicitly, you can optionally pass that qualifier to the constructor as the sixth parameter, which is named $dbSchema
.
try {
$userId = $auth->register($_POST['email'], $_POST['password'], $_POST['username'], function ($selector, $token) {
echo 'Send ' . $selector . ' and ' . $token . ' to the user (e.g. via email)';
});
echo 'We have signed up a new user with the ID ' . $userId;
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Invalid email address');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password');
}
catch (\Delight\Auth\UserAlreadyExistsException $e) {
die('User already exists');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Note: The anonymous callback function is a closure. Thus, besides its own parameters, only superglobals like $_GET
, $_POST
, $_COOKIE
and $_SERVER
are available inside. For any other variable from the parent scope, you need to explicitly make a copy available inside by adding a use
clause after the parameter list.
The username in the third parameter is optional. You can pass null
there if you don’t want to manage usernames.
If you want to enforce unique usernames, on the other hand, simply call registerWithUniqueUsername
instead of register
, and be prepared to catch the DuplicateUsernameException
.
For email verification, you should build an URL with the selector and token and send it to the user, e.g.:
$url = 'https://www.example.com/verify_email?selector=' . \urlencode($selector) . '&token=' . \urlencode($token);
If you don’t want to perform email verification, just omit the last parameter to Auth#register
. The new user will be active immediately, then.
Need to store additional user information? Read on here.
try {
$auth->login($_POST['email'], $_POST['password']);
echo 'User is logged in';
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Wrong email address');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Wrong password');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Email not verified');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
If you want to sign in with usernames on the other hand, either in addition to the login via email address or as a replacement, that’s possible as well. Simply call the method loginWithUsername
instead of method login
. Then, instead of catching InvalidEmailException
, make sure to catch both UnknownUsernameException
and AmbiguousUsernameException
. You may also want to read the notes about the uniqueness of usernames in the section that explains how to sign up new users.
Extract the selector and token from the URL that the user clicked on in the verification email.
try {
$auth->confirmEmail($_GET['selector'], $_GET['token']);
echo 'Email address has been verified';
}
catch (\Delight\Auth\InvalidSelectorTokenPairException $e) {
die('Invalid token');
}
catch (\Delight\Auth\TokenExpiredException $e) {
die('Token expired');
}
catch (\Delight\Auth\UserAlreadyExistsException $e) {
die('Email address already exists');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
If you want the user to be automatically signed in after successful confirmation, just call confirmEmailAndSignIn
instead of confirmEmail
. That alternative method also supports persistent logins via its optional third parameter.
On success, the two methods confirmEmail
and confirmEmailAndSignIn
both return an array with the user’s new email address, which has just been verified, at index one. If the confirmation was for an address change instead of a simple address verification, the user’s old email address will be included in the array at index zero.
The third parameter to the Auth#login
and Auth#confirmEmailAndSignIn
methods controls whether the login is persistent with a long-lived cookie. With such a persistent login, users may stay authenticated for a long time, even when the browser session has already been closed and the session cookies have expired. Typically, you’ll want to keep the user logged in for weeks or months with this feature, which is known as “remember me” or “keep me logged in”. Many users will find this more convenient, but it may be less secure if they leave their devices unattended.
if ($_POST['remember'] == 1) {
// keep logged in for one year
$rememberDuration = (int) (60 * 60 * 24 * 365.25);
}
else {
// do not keep logged in after session ends
$rememberDuration = null;
}
// ...
$auth->login($_POST['email'], $_POST['password'], $rememberDuration);
// ...
Without the persistent login, which is the default behavior, a user will only stay logged in until they close their browser, or as long as configured via session.cookie_lifetime
and session.gc_maxlifetime
in PHP.
Omit the third parameter or set it to null
to disable the feature. Otherwise, you may ask the user whether they want to enable “remember me”. This is usually done with a checkbox in your user interface. Use the input from that checkbox to decide between null
and a pre-defined duration in seconds here, e.g. 60 * 60 * 24 * 365.25
for one year.
try {
$auth->forgotPassword($_POST['email'], function ($selector, $token) {
echo 'Send ' . $selector . ' and ' . $token . ' to the user (e.g. via email)';
});
echo 'Request has been generated';
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Invalid email address');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Email not verified');
}
catch (\Delight\Auth\ResetDisabledException $e) {
die('Password reset is disabled');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Note: The anonymous callback function is a closure. Thus, besides its own parameters, only superglobals like $_GET
, $_POST
, $_COOKIE
and $_SERVER
are available inside. For any other variable from the parent scope, you need to explicitly make a copy available inside by adding a use
clause after the parameter list.
You should build an URL with the selector and token and send it to the user, e.g.:
$url = 'https://www.example.com/reset_password?selector=' . \urlencode($selector) . '&token=' . \urlencode($token);
If the default lifetime of the password reset requests does not work for you, you can use the third parameter of Auth#forgotPassword
to specify a custom interval in seconds after which the requests should expire.
As the next step, users will click on the link that they received. Extract the selector and token from the URL.
If the selector/token pair is valid, let the user choose a new password:
try {
$auth->canResetPasswordOrThrow($_GET['selector'], $_GET['token']);
echo 'Put the selector into a "hidden" field (or keep it in the URL)';
echo 'Put the token into a "hidden" field (or keep it in the URL)';
echo 'Ask the user for their new password';
}
catch (\Delight\Auth\InvalidSelectorTokenPairException $e) {
die('Invalid token');
}
catch (\Delight\Auth\TokenExpiredException $e) {
die('Token expired');
}
catch (\Delight\Auth\ResetDisabledException $e) {
die('Password reset is disabled');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Alternatively, if you don’t need any error messages but only want to check the validity, you can use the slightly simpler version:
if ($auth->canResetPassword($_GET['selector'], $_GET['token'])) {
echo 'Put the selector into a "hidden" field (or keep it in the URL)';
echo 'Put the token into a "hidden" field (or keep it in the URL)';
echo 'Ask the user for their new password';
}
Now when you have the new password for the user (and still have the other two pieces of information), you can reset the password:
try {
$auth->resetPassword($_POST['selector'], $_POST['token'], $_POST['password']);
echo 'Password has been reset';
}
catch (\Delight\Auth\InvalidSelectorTokenPairException $e) {
die('Invalid token');
}
catch (\Delight\Auth\TokenExpiredException $e) {
die('Token expired');
}
catch (\Delight\Auth\ResetDisabledException $e) {
die('Password reset is disabled');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
If a user is currently logged in, they may change their password.
try {
$auth->changePassword($_POST['oldPassword'], $_POST['newPassword']);
echo 'Password has been changed';
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('Not logged in');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password(s)');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Asking the user for their current (and soon old) password and requiring it for verification is the recommended way to handle password changes. This is shown above.
If you’re sure that you don’t need that confirmation, however, you may call changePasswordWithoutOldPassword
instead of changePassword
and drop the first parameter from that method call (which would otherwise contain the old password).
In any case, after the user’s password has been changed, you should send an email to their account’s primary email address as an out-of-band notification informing the account owner about this critical change.
If a user is currently logged in, they may change their email address.
try {
if ($auth->reconfirmPassword($_POST['password'])) {
$auth->changeEmail($_POST['newEmail'], function ($selector, $token) {
echo 'Send ' . $selector . ' and ' . $token . ' to the user (e.g. via email to the *new* address)';
});
echo 'The change will take effect as soon as the new email address has been confirmed';
}
else {
echo 'We can\'t say if the user is who they claim to be';
}
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Invalid email address');
}
catch (\Delight\Auth\UserAlreadyExistsException $e) {
die('Email address already exists');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Account not verified');
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('Not logged in');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Note: The anonymous callback function is a closure. Thus, besides its own parameters, only superglobals like $_GET
, $_POST
, $_COOKIE
and $_SERVER
are available inside. For any other variable from the parent scope, you need to explicitly make a copy available inside by adding a use
clause after the parameter list.
For email verification, you should build an URL with the selector and token and send it to the user, e.g.:
$url = 'https://www.example.com/verify_email?selector=' . \urlencode($selector) . '&token=' . \urlencode($token);
After the request to change the email address has been made, or even better, after the change has been confirmed by the user, you should send an email to their account’s previous email address as an out-of-band notification informing the account owner about this critical change.
Note: Changes to a user’s email address take effect in the local session immediately, as expected. In other sessions (e.g. on other devices), the changes may need up to five minutes to take effect, though. This increases performance and usually poses no problem. If you want to change this behavior, nevertheless, simply decrease (or perhaps increase) the value that you pass to the Auth
constructor as the argument named $sessionResyncInterval
.
If an earlier confirmation request could not be delivered to the user, or if the user missed that request, or if they just don’t want to wait any longer, you may re-send an earlier request like this:
try {
$auth->resendConfirmationForEmail($_POST['email'], function ($selector, $token) {
echo 'Send ' . $selector . ' and ' . $token . ' to the user (e.g. via email)';
});
echo 'The user may now respond to the confirmation request (usually by clicking a link)';
}
catch (\Delight\Auth\ConfirmationRequestNotFound $e) {
die('No earlier request found that could be re-sent');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('There have been too many requests -- try again later');
}
If you want to specify the user by their ID instead of by their email address, this is possible as well:
try {
$auth->resendConfirmationForUserId($_POST['userId'], function ($selector, $token) {
echo 'Send ' . $selector . ' and ' . $token . ' to the user (e.g. via email)';
});
echo 'The user may now respond to the confirmation request (usually by clicking a link)';
}
catch (\Delight\Auth\ConfirmationRequestNotFound $e) {
die('No earlier request found that could be re-sent');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('There have been too many requests -- try again later');
}
Note: The anonymous callback function is a closure. Thus, besides its own parameters, only superglobals like $_GET
, $_POST
, $_COOKIE
and $_SERVER
are available inside. For any other variable from the parent scope, you need to explicitly make a copy available inside by adding a use
clause after the parameter list.
Usually, you should build an URL with the selector and token and send it to the user, e.g. as follows:
$url = 'https://www.example.com/verify_email?selector=' . \urlencode($selector) . '&token=' . \urlencode($token);
$auth->logOut();
// or
try {
$auth->logOutEverywhereElse();
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('Not logged in');
}
// or
try {
$auth->logOutEverywhere();
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('Not logged in');
}
Additionally, if you store custom information in the session as well, and if you want that information to be deleted, you can destroy the entire session by calling a second method:
$auth->destroySession();
Note: Global logouts take effect in the local session immediately, as expected. In other sessions (e.g. on other devices), the changes may need up to five minutes to take effect, though. This increases performance and usually poses no problem. If you want to change this behavior, nevertheless, simply decrease (or perhaps increase) the value that you pass to the Auth
constructor as the argument named $sessionResyncInterval
.
if ($auth->isLoggedIn()) {
echo 'User is signed in';
}
else {
echo 'User is not signed in yet';
}
A shorthand/alias for this method is $auth->check()
.
$id = $auth->getUserId();
If the user is not currently signed in, this returns null
.
A shorthand/alias for this method is $auth->id()
.
$email = $auth->getEmail();
If the user is not currently signed in, this returns null
.
$username = $auth->getUsername();
Remember that usernames are optional and there is only a username if you supplied it during registration.
If the user is not currently signed in, this returns null
.
if ($auth->isNormal()) {
echo 'User is in default state';
}
if ($auth->isArchived()) {
echo 'User has been archived';
}
if ($auth->isBanned()) {
echo 'User has been banned';
}
if ($auth->isLocked()) {
echo 'User has been locked';
}
if ($auth->isPendingReview()) {
echo 'User is pending review';
}
if ($auth->isSuspended()) {
echo 'User has been suspended';
}
if ($auth->isRemembered()) {
echo 'User did not sign in but was logged in through their long-lived cookie';
}
else {
echo 'User signed in manually';
}
If the user is not currently signed in, this returns null
.
$ip = $auth->getIpAddress();
In order to preserve this library’s suitability for all purposes as well as its full re-usability, it doesn’t come with additional bundled columns for user information. But you don’t have to do without additional user information, of course:
Here’s how to use this library with your own tables for custom user information in a maintainable and re-usable way:
-
Add any number of custom database tables where you store custom user information, e.g. a table named
profiles
. -
Whenever you call the
register
method (which returns the new user’s ID), add your own logic afterwards that fills your custom database tables. -
If you need the custom user information only rarely, you may just retrieve it as needed. If you need it more frequently, however, you’d probably want to have it in your session data. The following method is how you can load and access your data in a reliable way:
function getUserInfo(\Delight\Auth\Auth $auth) { if (!$auth->isLoggedIn()) { return null; } if (!isset($_SESSION['_internal_user_info'])) { // TODO: load your custom user information and assign it to the session variable below // $_SESSION['_internal_user_info'] = ... } return $_SESSION['_internal_user_info']; }
Whenever you want to confirm the user’s identity again, e.g. before the user is allowed to perform some “dangerous” action, you should verify their password again to confirm that they actually are who they claim to be.
For example, when a user has been remembered by a long-lived cookie and thus Auth#isRemembered
returns true
, this means that the user probably has not entered their password for quite some time anymore. You may want to reconfirm their password in that case.
try {
if ($auth->reconfirmPassword($_POST['password'])) {
echo 'The user really seems to be who they claim to be';
}
else {
echo 'We can\'t say if the user is who they claim to be';
}
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('The user is not signed in');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
Every user can have any number of roles, which you can use to implement authorization and to refine your access controls.
Users may have no role at all (which they do by default), exactly one role, or any arbitrary combination of roles.
if ($auth->hasRole(\Delight\Auth\Role::SUPER_MODERATOR)) {
echo 'The user is a super moderator';
}
// or
if ($auth->hasAnyRole(\Delight\Auth\Role::DEVELOPER, \Delight\Auth\Role::MANAGER)) {
echo 'The user is either a developer, or a manager, or both';
}
// or
if ($auth->hasAllRoles(\Delight\Auth\Role::DEVELOPER, \Delight\Auth\Role::MANAGER)) {
echo 'The user is both a developer and a manager';
}
While the method hasRole
takes exactly one role as its argument, the two methods hasAnyRole
and hasAllRoles
can take any number of roles that you would like to check for.
Alternatively, you can get a list of all the roles that have been assigned to the user:
$auth->getRoles();
\Delight\Auth\Role::ADMIN;
\Delight\Auth\Role::AUTHOR;
\Delight\Auth\Role::COLLABORATOR;
\Delight\Auth\Role::CONSULTANT;
\Delight\Auth\Role::CONSUMER;
\Delight\Auth\Role::CONTRIBUTOR;
\Delight\Auth\Role::COORDINATOR;
\Delight\Auth\Role::CREATOR;
\Delight\Auth\Role::DEVELOPER;
\Delight\Auth\Role::DIRECTOR;
\Delight\Auth\Role::EDITOR;
\Delight\Auth\Role::EMPLOYEE;
\Delight\Auth\Role::MAINTAINER;
\Delight\Auth\Role::MANAGER;
\Delight\Auth\Role::MODERATOR;
\Delight\Auth\Role::PUBLISHER;
\Delight\Auth\Role::REVIEWER;
\Delight\Auth\Role::SUBSCRIBER;
\Delight\Auth\Role::SUPER_ADMIN;
\Delight\Auth\Role::SUPER_EDITOR;
\Delight\Auth\Role::SUPER_MODERATOR;
\Delight\Auth\Role::TRANSLATOR;
You can use any of these roles and ignore those that you don’t need. The list above can also be retrieved programmatically, in one of three formats:
\Delight\Auth\Role::getMap();
// or
\Delight\Auth\Role::getNames();
// or
\Delight\Auth\Role::getValues();
The permissions of each user are encoded in the way that role requirements are specified throughout your code base. If those requirements are evaluated with a specific user’s set of roles, implicitly checked permissions are the result.
For larger projects, it is often recommended to maintain the definition of permissions in a single place. You then don’t check for roles in your business logic, but you check for individual permissions. You could implement that concept as follows:
function canEditArticle(\Delight\Auth\Auth $auth) {
return $auth->hasAnyRole(
\Delight\Auth\Role::MODERATOR,
\Delight\Auth\Role::SUPER_MODERATOR,
\Delight\Auth\Role::ADMIN,
\Delight\Auth\Role::SUPER_ADMIN
);
}
// ...
if (canEditArticle($auth)) {
echo 'The user can edit articles here';
}
// ...
if (canEditArticle($auth)) {
echo '... and here';
}
// ...
if (canEditArticle($auth)) {
echo '... and here';
}
As you can see, the permission of whether a certain user can edit an article is stored at a central location. This implementation has two major advantages:
If you want to know which users can edit articles, you don’t have to check your business logic in various places, but you only have to look where the specific permission is defined. And if you want to change who can edit an article, you only have to do this in one single place as well, not throughout your whole code base.
But this also comes with slightly more overhead when implementing the access restrictions for the first time, which may or may not be worth it for your project.
If the names of the included roles don’t work for you, you can alias any number of roles using your own identifiers, e.g. like this:
namespace My\Namespace;
final class MyRole {
const CUSTOMER_SERVICE_AGENT = \Delight\Auth\Role::REVIEWER;
const FINANCIAL_DIRECTOR = \Delight\Auth\Role::COORDINATOR;
private function __construct() {}
}
The example above would allow you to use
\My\Namespace\MyRole::CUSTOMER_SERVICE_AGENT;
// and
\My\Namespace\MyRole::FINANCIAL_DIRECTOR;
instead of
\Delight\Auth\Role::REVIEWER;
// and
\Delight\Auth\Role::COORDINATOR;
Just remember not to alias a single included role to multiple roles with custom names.
While password resets via email are a convenient feature that most users find helpful from time to time, the availability of this feature implies that accounts on your service are only ever as secure as the user’s associated email account.
You may provide security-conscious (and experienced) users with the possibility to disable password resets for their accounts (and to enable them again later) for enhanced security:
try {
if ($auth->reconfirmPassword($_POST['password'])) {
$auth->setPasswordResetEnabled($_POST['enabled'] == 1);
echo 'The setting has been changed';
}
else {
echo 'We can\'t say if the user is who they claim to be';
}
}
catch (\Delight\Auth\NotLoggedInException $e) {
die('The user is not signed in');
}
catch (\Delight\Auth\TooManyRequestsException $e) {
die('Too many requests');
}
In order to check the current value of this setting, use the return value from
$auth->isPasswordResetEnabled();
for the correct default option in your user interface. You don’t need to check this value for restrictions of the feature, which are enforced automatically.
All methods provided by this library are automatically protected against excessive numbers of requests from clients.
If you would like to throttle or rate limit external features or methods as well, e.g. those in your own code, you can make use of the built-in helper method for throttling and rate limiting:
try {
// throttle the specified resource or feature to *3* requests per *60* seconds
$auth->throttle([ 'my-resource-name' ], 3, 60);
echo 'Do something with the resource or feature';
}
catch (\Delight\Auth\TooManyRequestsException $e) {
// operation cancelled
\http_response_code(429);
exit;
}
If the protection of the resource or feature should additionally depend on another attribute, e.g. to track something separately per IP address, just add more data to the resource description, such as:
[ 'my-resource-name', $_SERVER['REMOTE_ADDR'] ]
// instead of
// [ 'my-resource-name' ]
Allowing short bursts of activity during peak demand is possible by specifying a burst factor as the fourth argument. A value of 5
, for example, would permit temporary bursts of fivefold activity, compared to the generally accepted level.
In some cases, you may just want to simulate the throttling or rate limiting. This lets you check whether an action would be permitted without actually modifying the activity tracker. To do so, simply pass true
as the fifth argument.
The administrative interface is available via $auth->admin()
. You can call various method on this interface, as documented below.
Do not forget to implement secure access control before exposing access to this interface. For example, you may provide access to this interface to logged in users with the administrator role only, or use the interface in private scripts only.
try {
$userId = $auth->admin()->createUser($_POST['email'], $_POST['password'], $_POST['username']);
echo 'We have signed up a new user with the ID ' . $userId;
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Invalid email address');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password');
}
catch (\Delight\Auth\UserAlreadyExistsException $e) {
die('User already exists');
}
The username in the third parameter is optional. You can pass null
there if you don’t want to manage usernames.
If you want to enforce unique usernames, on the other hand, simply call createUserWithUniqueUsername
instead of createUser
, and be prepared to catch the DuplicateUsernameException
.
Deleting users by their ID:
try {
$auth->admin()->deleteUserById($_POST['id']);
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown ID');
}
Deleting users by their email address:
try {
$auth->admin()->deleteUserByEmail($_POST['email']);
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Unknown email address');
}
Deleting users by their username:
try {
$auth->admin()->deleteUserByUsername($_POST['username']);
}
catch (\Delight\Auth\UnknownUsernameException $e) {
die('Unknown username');
}
catch (\Delight\Auth\AmbiguousUsernameException $e) {
die('Ambiguous username');
}
try {
$auth->admin()->addRoleForUserById($userId, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown user ID');
}
// or
try {
$auth->admin()->addRoleForUserByEmail($userEmail, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Unknown email address');
}
// or
try {
$auth->admin()->addRoleForUserByUsername($username, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\UnknownUsernameException $e) {
die('Unknown username');
}
catch (\Delight\Auth\AmbiguousUsernameException $e) {
die('Ambiguous username');
}
Note: Changes to a user’s set of roles may need up to five minutes to take effect. This increases performance and usually poses no problem. If you want to change this behavior, nevertheless, simply decrease (or perhaps increase) the value that you pass to the Auth
constructor as the argument named $sessionResyncInterval
.
try {
$auth->admin()->removeRoleForUserById($userId, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown user ID');
}
// or
try {
$auth->admin()->removeRoleForUserByEmail($userEmail, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Unknown email address');
}
// or
try {
$auth->admin()->removeRoleForUserByUsername($username, \Delight\Auth\Role::ADMIN);
}
catch (\Delight\Auth\UnknownUsernameException $e) {
die('Unknown username');
}
catch (\Delight\Auth\AmbiguousUsernameException $e) {
die('Ambiguous username');
}
Note: Changes to a user’s set of roles may need up to five minutes to take effect. This increases performance and usually poses no problem. If you want to change this behavior, nevertheless, simply decrease (or perhaps increase) the value that you pass to the Auth
constructor as the argument named $sessionResyncInterval
.
try {
if ($auth->admin()->doesUserHaveRole($userId, \Delight\Auth\Role::ADMIN)) {
echo 'The specified user is an administrator';
}
else {
echo 'The specified user is not an administrator';
}
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown user ID');
}
Alternatively, you can get a list of all the roles that have been assigned to the user:
$auth->admin()->getRolesForUserById($userId);
try {
$auth->admin()->logInAsUserById($_POST['id']);
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown ID');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Email address not verified');
}
// or
try {
$auth->admin()->logInAsUserByEmail($_POST['email']);
}
catch (\Delight\Auth\InvalidEmailException $e) {
die('Unknown email address');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Email address not verified');
}
// or
try {
$auth->admin()->logInAsUserByUsername($_POST['username']);
}
catch (\Delight\Auth\UnknownUsernameException $e) {
die('Unknown username');
}
catch (\Delight\Auth\AmbiguousUsernameException $e) {
die('Ambiguous username');
}
catch (\Delight\Auth\EmailNotVerifiedException $e) {
die('Email address not verified');
}
try {
$auth->admin()->changePasswordForUserById($_POST['id'], $_POST['newPassword']);
}
catch (\Delight\Auth\UnknownIdException $e) {
die('Unknown ID');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password');
}
// or
try {
$auth->admin()->changePasswordForUserByUsername($_POST['username'], $_POST['newPassword']);
}
catch (\Delight\Auth\UnknownUsernameException $e) {
die('Unknown username');
}
catch (\Delight\Auth\AmbiguousUsernameException $e) {
die('Ambiguous username');
}
catch (\Delight\Auth\InvalidPasswordException $e) {
die('Invalid password');
}
This library uses two cookies to keep state on the client: The first, whose name you can retrieve using
\session_name();
is the general (mandatory) session cookie. The second (optional) cookie is only used for persistent logins and its name can be retrieved as follows:
\Delight\Auth\Auth::createRememberCookieName();
You can rename the session cookie used by this library through one of the following means, in order of recommendation:
-
In the PHP configuration (
php.ini
), find the line with thesession.name
directive and change its value to something likesession_v1
, as in:session.name = session_v1
-
As early as possible in your application, and before you create the
Auth
instance, call\ini_set
to changesession.name
to something likesession_v1
, as in:\ini_set('session.name', 'session_v1');
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
). -
As early as possible in your application, and before you create the
Auth
instance, call\session_name
with an argument likesession_v1
, as in:\session_name('session_v1');
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
).
The name of the cookie for persistent logins will change as well – automatically – following your change of the session cookie’s name.
A cookie’s domain
attribute controls which domain (and which subdomains) the cookie will be valid for, and thus where the user’s session and authentication state will be available.
The recommended default is an empty string, which means that the cookie will only be valid for the exact current host, excluding any subdomains that may exist. You should only use a different value if you need to share cookies between different subdomains. Often, you’ll want to share cookies between the bare domain and the www
subdomain, but you might also want to share them between any other set of subdomains.
Whatever set of subdomains you choose, you should set the cookie’s attribute to the most specific domain name that still includes all your required subdomains. For example, to share cookies between example.com
and www.example.com
, you would set the attribute to example.com
. But if you wanted to share cookies between sub1.app.example.com
and sub2.app.example.com
, you should set the attribute to app.example.com
. Any explicitly specified domain name will always include all subdomains that may exist.
You can change the attribute through one of the following means, in order of recommendation:
-
In the PHP configuration (
php.ini
), find the line with thesession.cookie_domain
directive and change its value as desired, e.g.:session.cookie_domain = example.com
-
As early as possible in your application, and before you create the
Auth
instance, call\ini_set
to change the value of thesession.cookie_domain
directive as desired, e.g.:\ini_set('session.cookie_domain', 'example.com');
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
).
A cookie’s path
attribute controls which directories (and subdirectories) the cookie will be valid for, and thus where the user’s session and authentication state will be available.
In most cases, you’ll want to make cookies available for all paths, i.e. any directory and file, starting in the root directory. That is what a value of /
for the attribute does, which is also the recommended default. You should only change this attribute to a different value, e.g. /path/to/subfolder
, if you want to restrict which directories your cookies will be available in, e.g. to host multiple applications side-by-side, in different directories, under the same domain name.
You can change the attribute through one of the following means, in order of recommendation:
-
In the PHP configuration (
php.ini
), find the line with thesession.cookie_path
directive and change its value as desired, e.g.:session.cookie_path = /
-
As early as possible in your application, and before you create the
Auth
instance, call\ini_set
to change the value of thesession.cookie_path
directive as desired, e.g.:\ini_set('session.cookie_path', '/');
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
).
Using the httponly
attribute, you can control whether client-side scripts, i.e. JavaScript, should be able to access your cookies or not. For security reasons, it is best to deny script access to your cookies, which reduces the damage that successful XSS attacks against your application could do, for example.
Thus, you should always set httponly
to 1
, except for the rare cases where you really need access to your cookies from JavaScript and can’t find any better solution. In those cases, set the attribute to 0
, but be aware of the consequences.
You can change the attribute through one of the following means, in order of recommendation:
-
In the PHP configuration (
php.ini
), find the line with thesession.cookie_httponly
directive and change its value as desired, e.g.:session.cookie_httponly = 1
-
As early as possible in your application, and before you create the
Auth
instance, call\ini_set
to change the value of thesession.cookie_httponly
directive as desired, e.g.:\ini_set('session.cookie_httponly', 1);
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
).
Using the secure
attribute, you can control whether cookies should be sent over any connection, including plain HTTP, or whether a secure connection, i.e. HTTPS (with SSL/TLS), should be required. The former (less secure) mode can be chosen by setting the attribute to 0
, and the latter (more secure) mode can be chosen by setting the attribute to 1
.
Obviously, this solely depends on whether you are able to serve all pages exclusively via HTTPS. If you can, you should set the attribute to 1
and possibly combine it with HTTP redirects to the secure protocol and HTTP Strict Transport Security (HSTS). Otherwise, you may have to keep the attribute set to 0
.
You can change the attribute through one of the following means, in order of recommendation:
-
In the PHP configuration (
php.ini
), find the line with thesession.cookie_secure
directive and change its value as desired, e.g.:session.cookie_secure = 1
-
As early as possible in your application, and before you create the
Auth
instance, call\ini_set
to change the value of thesession.cookie_secure
directive as desired, e.g.:\ini_set('session.cookie_secure', 1);
For this to work,
session.auto_start
must be set to0
in the PHP configuration (php.ini
).
$length = 24;
$randomStr = \Delight\Auth\Auth::createRandomString($length);
$uuid = \Delight\Auth\Auth::createUuid();
For detailed information on how to read and write session data conveniently, please refer to the documentation of the session library, which is included by default.
Any password or authentication token is automatically hashed using the “bcrypt” function, which is based on the “Blowfish” cipher and (still) considered one of the strongest password hash functions today. “bcrypt” is used with 1,024 iterations, i.e. a “cost” factor of 10. A random “salt” is applied automatically as well.
You can verify this configuration by looking at the hashes in your database table users
. If the above is true with your setup, all password hashes in your users
table should start with the prefix $2$10$
, $2a$10$
or $2y$10$
.
When new algorithms (such as Argon2) may be introduced in the future, this library will automatically take care of “upgrading” your existing password hashes whenever a user signs in or changes their password.
Enforcing a minimum length for passwords is usually a good idea. Apart from that, you may want to look up whether a potential password is in some blacklist, which you could manage in a database or in a file, in order to prevent dictionary words or commonly used passwords from being used in your application.
To allow for maximum flexibility and ease of use, this library has been designed so that it does not contain any further checks for password requirements itself, but instead allows you to wrap your own checks around the relevant calls to library methods. Example:
function isPasswordAllowed($password) {
if (\strlen($password) < 8) {
return false;
}
$blacklist = [ 'password1', '123456', 'qwerty' ];
if (\in_array($password, $blacklist)) {
return false;
}
return true;
}
if (isPasswordAllowed($password)) {
$auth->register($email, $password);
}
You might try loading this library first, and creating the Auth
instance first, before loading the other libraries. Apart from that, there’s probably not much we can do here.
If you want to let others include your site in a <frame>
, <iframe>
, <object>
, <embed>
or <applet>
element, you have to disable the default clickjacking prevention:
\header_remove('X-Frame-Options');
This library throws two types of exceptions to indicate problems:
AuthException
and its subclasses are thrown whenever a method does not complete successfully. You should always catch these exceptions as they carry the normal error responses that you must react to.AuthError
and its subclasses are thrown whenever there is an internal problem or the library has not been installed correctly. You should not catch these exceptions.
- Serve all pages over HTTPS only, i.e. using SSL/TLS for every single request.
- You should enforce a minimum length for passwords, e.g. 10 characters, but never any maximum length, at least not anywhere below 100 characters. Moreover, you should not restrict the set of allowed characters.
- Whenever a user was remembered through the “remember me” feature enabled or disabled during sign in, which means that they did not log in by typing their password, you should require re-authentication for critical features.
- Encourage users to use passphrases, i.e. combinations of words or even full sentences, instead of single passwords.
- Do not prevent users' password managers from working correctly. Thus, use the standard form fields only and do not prevent copy and paste.
- Before executing sensitive account operations (e.g. changing a user’s email address, deleting a user’s account), you should always require re-authentication, i.e. require the user to verify their login credentials once more.
- You should not offer an online password reset feature (“forgot password”) for high-security applications.
- For high-security applications, you should not use email addresses as identifiers. Instead, choose identifiers that are specific to the application and secret, e.g. an internal customer number.
All contributions are welcome! If you wish to contribute, please create an issue first so that your feature, problem or question can be discussed.
This project is licensed under the terms of the MIT License.