This bundle provides a JWT authenticator for Symfony applications. It's using PHP JWT Framework for parsing and validating the JWT.
Make sure Composer is installed globally, as explained in the installation chapter of the Composer documentation.
Open a command console, enter your project directory and execute:
$ composer require halloverden/symfony-jwt-authenticator-bundle
Open a command console, enter your project directory and execute the following command to download the latest stable version of this bundle:
$ composer require halloverden/symfony-jwt-authenticator-bundle
Then, enable the bundle by adding it to the list of registered bundles
in the config/bundles.php
file of your project:
// config/bundles.php
return [
// ...
HalloVerden\JwtAuthenticatorBundle\HalloVerdenJwtAuthenticatorBundle::class => ['all' => true],
];
The authenticator is enabled and configured in the security config.
example config:
# config/packages/security.yaml
security:
# ...
firewalls:
main:
hallo_verden_jwt:
provider: 'user_provider'
failure_handler: ~
token:
key_set: 'my_key_set'
jws_loader: 'hallo_verden_default'
claim_checker: 'hallo_verden_default'
mandatory_claims: []
user_identifier_claim: 'sub'
token_extractor: 'hallo_verden.token_extractor.bearer'
You need to provide a key set.
See PHP JWT Framework for how to provide a key set.
There is a default JWS loader provided (hallo_verden_default
), this loader is using the jws_compact
serializer
and supports RS256
and HS256
signature algorithms.
See PHP JWT Framework for how to create your own loader.
There is a default claim checker provided (hallo_verden_default
), this checker checks the exp
, iat
and nbf
claims.
See PHP JWT Framework for how to create your own checker.
Here you specify the claims that need to be mandatory in your JWT.
The user_identifier_claim
is automatically added as a mandatory claim.
This claim is sent to the user provider for retrieving the user.
The default extractor hallo_verden.token_extractor.bearer
get the bearer token from the authorization header.
You can create your own extractor by implementing the TokenExtractorInterface
and set the service id to this option.
By default, the following response is sent on failure:
{
"error": "INVALID_TOKEN"
}
You can modify this by creating a service implementing the AuthenticationFailureHandlerInterface and set the service id to this option.