Security Token
joserosalessantiago20@gmail.com
Username
Authenticated
Property | Value |
---|---|
Roles |
[
"ROLE_CUSTOMER"
]
|
Inherited Roles | none |
Token | Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken {#1025 -credentials: null -providerKey: "login_api" -user: App\Entity\Customer {#734 …} -roleNames: [ "ROLE_CUSTOMER" ] -authenticated: true -attributes: [] } |
Security Firewall
login_api
Name
Security enabled
Stateless
Allows anonymous
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.jwt_user_provider |
context | (none) |
entry_point | (none) |
user_checker | security.user_checker |
access_denied_handler | (none) |
access_denied_url | (none) |
listeners | [ "json_login" "anonymous" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#235 -map: Symfony\Component\Security\Http\AccessMap {#236 …} -authenticationEntryPoint: Symfony\Component\Security\Http\EntryPoint\RetryAuthenticationEntryPoint {#256 …} -logger: Symfony\Bridge\Monolog\Logger {#228 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\UsernamePasswordJsonAuthenticationListener {#258 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#316 …} -authenticationManager: Symfony\Component\Security\Core\Authentication\AuthenticationProviderManager {#259 …} -httpUtils: Symfony\Component\Security\Http\HttpUtils {#227 …} -providerKey: "login_api" -successHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationSuccessHandler {#262 …} -failureHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationFailureHandler {#274 …} -options: [ "username_path" => "email" "password_path" => "password" "check_path" => "/api/login_check" "use_forward" => false "require_previous_session" => false ] -logger: Symfony\Bridge\Monolog\Logger {#228 …} -eventDispatcher: Symfony\Component\HttpKernel\Debug\TraceableEventDispatcher {#417 …} -propertyAccessor: Symfony\Component\PropertyAccess\PropertyAccessor {#276 …} -sessionStrategy: Symfony\Component\Security\Http\Session\SessionAuthenticationStrategy {#180 …} } |
689.63 ms | Lexik\Bundle\JWTAuthenticationBundle\Response\JWTAuthenticationSuccessResponse {#1031 #data: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3Mzg3ODc1MzksImV4cCI6MTczODc5MTEzOSwicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6Impvc2Vyb3NhbGVzc2FudGlhZ28yMEBnbWFpbC5jb20ifQ.DIZZDsi8HpVPX-kYTxauxBgFSY0u_kAK6rd1wkby0TP99LY9Oe1sR-7B3aKDf3F8J1JXb_lxdMighkOBQQHcX9YIG1_Eh2-gm-Tw79X0baBSmTXzTxx_0o3D9VQhSiADZrGS_peWGqUzgrBb7HTJ--oHcE6ExmhKO4FNi5N2A3gidLPc3B5pckGmNvHOL1ZujPaYELD6rsIb07PbMI_kfRYJIotrM3fXy_Y1J1T1KWT_il-OKGrBsVMcdljEu-hJ-uK0d4bYTLVF76tYTqlYCBV2RhUE5esDRrg-cKGI-53onmpRJsWLRK7Z6W-Se_f8GEaKMPU2PJyKqeZmYZpJlu8KrsZ0VPiR0F1bKSM63OBHPYVJmydbYBQO88pL9_0L6ZFxI67WpjxxBx13yCyUlLol1h9bzE1MXhVvxIRmDh2w0_oI-MF99mwup6LbFiG4vCYutBYxCMoSK9XxRwoBCzDqShuqHqzzPmHkT3vEfe0crhdG6Zb2Nji7z7qSdXD4O_bm-4LB5Cifp4-urEYSLFbcrPVc1GyAvGQ7RiGm6LFrahJQaycBehcLaUmu3icIz86iAw_y86_stHtTdFa-EBaES-UnTORjK9nnOIoAGtQPpYIUvIapQW52bj1_W5GvGNrqjACAKYgegNBfy4bZLmDYkCckc2uXQymKCY6LAxQ","name":"Jos\u00e9 ","id":26893,"refresh_token":"64593e9f3024c170bdd985f495caa2d83cbb53d765c6e4d043ae36590c95d3d0381fdd08d592df31fa28ca4b2a37f2ef7440d12b18d2dfb4167ca094633311dc"}" #callback: null #encodingOptions: 15 +headers: Symfony\Component\HttpFoundation\ResponseHeaderBag {#1018 …} #content: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3Mzg3ODc1MzksImV4cCI6MTczODc5MTEzOSwicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6Impvc2Vyb3NhbGVzc2FudGlhZ28yMEBnbWFpbC5jb20ifQ.DIZZDsi8HpVPX-kYTxauxBgFSY0u_kAK6rd1wkby0TP99LY9Oe1sR-7B3aKDf3F8J1JXb_lxdMighkOBQQHcX9YIG1_Eh2-gm-Tw79X0baBSmTXzTxx_0o3D9VQhSiADZrGS_peWGqUzgrBb7HTJ--oHcE6ExmhKO4FNi5N2A3gidLPc3B5pckGmNvHOL1ZujPaYELD6rsIb07PbMI_kfRYJIotrM3fXy_Y1J1T1KWT_il-OKGrBsVMcdljEu-hJ-uK0d4bYTLVF76tYTqlYCBV2RhUE5esDRrg-cKGI-53onmpRJsWLRK7Z6W-Se_f8GEaKMPU2PJyKqeZmYZpJlu8KrsZ0VPiR0F1bKSM63OBHPYVJmydbYBQO88pL9_0L6ZFxI67WpjxxBx13yCyUlLol1h9bzE1MXhVvxIRmDh2w0_oI-MF99mwup6LbFiG4vCYutBYxCMoSK9XxRwoBCzDqShuqHqzzPmHkT3vEfe0crhdG6Zb2Nji7z7qSdXD4O_bm-4LB5Cifp4-urEYSLFbcrPVc1GyAvGQ7RiGm6LFrahJQaycBehcLaUmu3icIz86iAw_y86_stHtTdFa-EBaES-UnTORjK9nnOIoAGtQPpYIUvIapQW52bj1_W5GvGNrqjACAKYgegNBfy4bZLmDYkCckc2uXQymKCY6LAxQ","name":"Jos\u00e9 ","id":26893,"refresh_token":"64593e9f3024c170bdd985f495caa2d83cbb53d765c6e4d043ae36590c95d3d0381fdd08d592df31fa28ca4b2a37f2ef7440d12b18d2dfb4167ca094633311dc"}" #version: "1.1" #statusCode: 200 #statusText: "OK" #charset: "UTF-8" } |
Security Voters (3)
affirmative
Strategy