Security Token
andresmorales961206@gmail.com
Username
Authenticated
Property | Value |
---|---|
Roles |
[
"ROLE_CUSTOMER"
]
|
Inherited Roles | none |
Token | Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken {#1018 -credentials: null -providerKey: "login_api" -user: App\Entity\Customer {#734 …} -roleNames: [ "ROLE_CUSTOMER" ] -authenticated: true -attributes: [] } |
Security Firewall
login_api
Name
Security enabled
Stateless
Allows anonymous
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.jwt_user_provider |
context | (none) |
entry_point | (none) |
user_checker | security.user_checker |
access_denied_handler | (none) |
access_denied_url | (none) |
listeners | [ "json_login" "anonymous" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#234 -map: Symfony\Component\Security\Http\AccessMap {#235 …} -authenticationEntryPoint: Symfony\Component\Security\Http\EntryPoint\RetryAuthenticationEntryPoint {#255 …} -logger: Symfony\Bridge\Monolog\Logger {#227 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\UsernamePasswordJsonAuthenticationListener {#257 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#315 …} -authenticationManager: Symfony\Component\Security\Core\Authentication\AuthenticationProviderManager {#258 …} -httpUtils: Symfony\Component\Security\Http\HttpUtils {#226 …} -providerKey: "login_api" -successHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationSuccessHandler {#261 …} -failureHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationFailureHandler {#273 …} -options: [ "username_path" => "email" "password_path" => "password" "check_path" => "/api/login_check" "use_forward" => false "require_previous_session" => false ] -logger: Symfony\Bridge\Monolog\Logger {#227 …} -eventDispatcher: Symfony\Component\HttpKernel\Debug\TraceableEventDispatcher {#416 …} -propertyAccessor: Symfony\Component\PropertyAccess\PropertyAccessor {#275 …} -sessionStrategy: Symfony\Component\Security\Http\Session\SessionAuthenticationStrategy {#179 …} } |
875.14 ms | Lexik\Bundle\JWTAuthenticationBundle\Response\JWTAuthenticationSuccessResponse {#1031 #data: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3MzE5NDcxNDcsImV4cCI6MTczMTk1MDc0Nywicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6ImFuZHJlc21vcmFsZXM5NjEyMDZAZ21haWwuY29tIn0.alWez9fN4HdfoQqnirvC0i7BMdL4Vop4LLtwgzXKDtomit_YC0MR14FWKPiZC9xyKlK4R242GZDE50MC3JBVxaT3X_pcFNsv4QecyNOuc4GQ1hVlc6AxKD2S-p6pfHdBOmBmVGRawVcyUqn4pfgqZx-yx_H9P696S7niW-ZXU3gwdbTRerUf8MkGbjntcr8vTXWWZpEcg0b9ztYetUqPovg1Sj7_8AzTRFL4LUKBdJRdPaKF3VCMp8UyePjLs-vnqA39j0crNwS_3AoDsXue2uGtKUxeAJl3W_rlKZIM6g8xMfQAD2FxwhwZcjSCugLh3-K3Rq4EZEK_5ofy1NbwkrEHo32m1bwbwaNhbDoSlyZMr5WS8jnx-HSHxKzgI7XZWigGCWluhebFXyDGNa37anzmGsp5i5zKOaY-_YZUpUPg49gqfSZ2MuKV5MQCq0S-D23XBsaQGAJIzoG0WqpCIqVC9yEaA-WSiMFcPagc_1z9A0SW4H8VO1eUym2qVoZsrzieOK9GK-KD3ZGnIBBG9v2cfyq1PirRg-mNPmsxrAXDLec4tRZBRNDfZ3wHQyBjMsZIdDQO9GBSSDxLFaY2yo1CZhFFX2B4g5XKQ2O5Phfk_gtOqHyvR4O2QnfGisKwmZwOZxUQImxsuemmgIaBRzf0YWdymeDPkdOnO0U72yY","name":"andres","id":26636,"refresh_token":"af36b10c8ab1571f36ab74153feb0fc521a5886e0d3317c24c8474732e2a5b3a051c86dbfb574947ee1035cc1b4aac1a65c3b8b85d0ac888f316a80d765268fb"}" #callback: null #encodingOptions: 15 +headers: Symfony\Component\HttpFoundation\ResponseHeaderBag {#1023 …} #content: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3MzE5NDcxNDcsImV4cCI6MTczMTk1MDc0Nywicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6ImFuZHJlc21vcmFsZXM5NjEyMDZAZ21haWwuY29tIn0.alWez9fN4HdfoQqnirvC0i7BMdL4Vop4LLtwgzXKDtomit_YC0MR14FWKPiZC9xyKlK4R242GZDE50MC3JBVxaT3X_pcFNsv4QecyNOuc4GQ1hVlc6AxKD2S-p6pfHdBOmBmVGRawVcyUqn4pfgqZx-yx_H9P696S7niW-ZXU3gwdbTRerUf8MkGbjntcr8vTXWWZpEcg0b9ztYetUqPovg1Sj7_8AzTRFL4LUKBdJRdPaKF3VCMp8UyePjLs-vnqA39j0crNwS_3AoDsXue2uGtKUxeAJl3W_rlKZIM6g8xMfQAD2FxwhwZcjSCugLh3-K3Rq4EZEK_5ofy1NbwkrEHo32m1bwbwaNhbDoSlyZMr5WS8jnx-HSHxKzgI7XZWigGCWluhebFXyDGNa37anzmGsp5i5zKOaY-_YZUpUPg49gqfSZ2MuKV5MQCq0S-D23XBsaQGAJIzoG0WqpCIqVC9yEaA-WSiMFcPagc_1z9A0SW4H8VO1eUym2qVoZsrzieOK9GK-KD3ZGnIBBG9v2cfyq1PirRg-mNPmsxrAXDLec4tRZBRNDfZ3wHQyBjMsZIdDQO9GBSSDxLFaY2yo1CZhFFX2B4g5XKQ2O5Phfk_gtOqHyvR4O2QnfGisKwmZwOZxUQImxsuemmgIaBRzf0YWdymeDPkdOnO0U72yY","name":"andres","id":26636,"refresh_token":"af36b10c8ab1571f36ab74153feb0fc521a5886e0d3317c24c8474732e2a5b3a051c86dbfb574947ee1035cc1b4aac1a65c3b8b85d0ac888f316a80d765268fb"}" #version: "1.1" #statusCode: 200 #statusText: "OK" #charset: "UTF-8" } |
Security Voters (3)
affirmative
Strategy