Security Token
k3726460@gmail.com
Username
Authenticated
Property | Value |
---|---|
Roles |
[
"ROLE_CUSTOMER"
]
|
Inherited Roles | none |
Token | Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken {#1025 -credentials: null -providerKey: "login_api" -user: App\Entity\Customer {#734 …} -roleNames: [ "ROLE_CUSTOMER" ] -authenticated: true -attributes: [] } |
Security Firewall
login_api
Name
Security enabled
Stateless
Allows anonymous
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.jwt_user_provider |
context | (none) |
entry_point | (none) |
user_checker | security.user_checker |
access_denied_handler | (none) |
access_denied_url | (none) |
listeners | [ "json_login" "anonymous" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#235 -map: Symfony\Component\Security\Http\AccessMap {#236 …} -authenticationEntryPoint: Symfony\Component\Security\Http\EntryPoint\RetryAuthenticationEntryPoint {#256 …} -logger: Symfony\Bridge\Monolog\Logger {#228 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\UsernamePasswordJsonAuthenticationListener {#258 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#316 …} -authenticationManager: Symfony\Component\Security\Core\Authentication\AuthenticationProviderManager {#259 …} -httpUtils: Symfony\Component\Security\Http\HttpUtils {#227 …} -providerKey: "login_api" -successHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationSuccessHandler {#262 …} -failureHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationFailureHandler {#274 …} -options: [ "username_path" => "email" "password_path" => "password" "check_path" => "/api/login_check" "use_forward" => false "require_previous_session" => false ] -logger: Symfony\Bridge\Monolog\Logger {#228 …} -eventDispatcher: Symfony\Component\HttpKernel\Debug\TraceableEventDispatcher {#417 …} -propertyAccessor: Symfony\Component\PropertyAccess\PropertyAccessor {#276 …} -sessionStrategy: Symfony\Component\Security\Http\Session\SessionAuthenticationStrategy {#180 …} } |
813.19 ms | Lexik\Bundle\JWTAuthenticationBundle\Response\JWTAuthenticationSuccessResponse {#1033 #data: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3NDA2NjE5MTQsImV4cCI6MTc0MDY2NTUxNCwicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6ImszNzI2NDYwQGdtYWlsLmNvbSJ9.IGGAKdaw_VKofUEC7B9Wu-gVqYwCf9KcZhGybZ8JnguvEnirRBOvkOfOIDTJ3p6Tz4hgtrnaTAamxlFuCmosNE_neJpOAu3RGzUb0YbXJ9U9NQn3A19VFuEyFOMNXVjqNHIPrx6XqKCtVKscmPlEEFr7zzzNB02Fm82O2sok4rqt5LiVWnMc-hN76QklAUpJrTosS-Pmm9bq3Cf-higoe2SSTaYMPkwy3E352XG2KN_f3WG-z-lZ6jKyJVGjFrV3BdewhiWzv9H8Ift1MD7MgMsT_Sj6NMgkPPIrZauRdGAtaJ6LIvrTXfZNqQkWLi0P1d1IHh6Oc0l0GrV1MmqWMkRO0nVo_yUpmZqm4TpPmD-mjrBHRbbqd_hCE4b-YCNnuvudmt_9AacrdG00IC_IVuDE0GG3h_7sAxtLQqbb5lfNS1pnSznxCLlvhdujQJ0N7i9qujEZ-41dRvfzJPWE1jRTXFeYIb39j6IbE_mBKv1S5BE4XtT0uhM4_85bwsAiWNSfuadHLH11X4dw4whv_xm03jycyF7QeV72ARXAdOQxOLHHAPJBi1p5Vtwmtsii381E9GaG2GS5z69cC_9_DHs-YJOXEIAKjwMMuq53S6i_963nzjXxWRTGrZT3fj3cxpOmyRUyX-zXUJkdaOI_pPvtAAl1sl-EgHUBGn-UR3Y","name":"Iskan","id":26969,"refresh_token":"afef02cfda03bf106731950c49db9eddbb6ac73ffe31401f1faf8fe8ec74caf326217e0713c6f4c6d39d5bec787a012b242428ff8ac77f6ee9795122b783d437"}" #callback: null #encodingOptions: 15 +headers: Symfony\Component\HttpFoundation\ResponseHeaderBag {#1086 …} #content: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3NDA2NjE5MTQsImV4cCI6MTc0MDY2NTUxNCwicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6ImszNzI2NDYwQGdtYWlsLmNvbSJ9.IGGAKdaw_VKofUEC7B9Wu-gVqYwCf9KcZhGybZ8JnguvEnirRBOvkOfOIDTJ3p6Tz4hgtrnaTAamxlFuCmosNE_neJpOAu3RGzUb0YbXJ9U9NQn3A19VFuEyFOMNXVjqNHIPrx6XqKCtVKscmPlEEFr7zzzNB02Fm82O2sok4rqt5LiVWnMc-hN76QklAUpJrTosS-Pmm9bq3Cf-higoe2SSTaYMPkwy3E352XG2KN_f3WG-z-lZ6jKyJVGjFrV3BdewhiWzv9H8Ift1MD7MgMsT_Sj6NMgkPPIrZauRdGAtaJ6LIvrTXfZNqQkWLi0P1d1IHh6Oc0l0GrV1MmqWMkRO0nVo_yUpmZqm4TpPmD-mjrBHRbbqd_hCE4b-YCNnuvudmt_9AacrdG00IC_IVuDE0GG3h_7sAxtLQqbb5lfNS1pnSznxCLlvhdujQJ0N7i9qujEZ-41dRvfzJPWE1jRTXFeYIb39j6IbE_mBKv1S5BE4XtT0uhM4_85bwsAiWNSfuadHLH11X4dw4whv_xm03jycyF7QeV72ARXAdOQxOLHHAPJBi1p5Vtwmtsii381E9GaG2GS5z69cC_9_DHs-YJOXEIAKjwMMuq53S6i_963nzjXxWRTGrZT3fj3cxpOmyRUyX-zXUJkdaOI_pPvtAAl1sl-EgHUBGn-UR3Y","name":"Iskan","id":26969,"refresh_token":"afef02cfda03bf106731950c49db9eddbb6ac73ffe31401f1faf8fe8ec74caf326217e0713c6f4c6d39d5bec787a012b242428ff8ac77f6ee9795122b783d437"}" #version: "1.1" #statusCode: 200 #statusText: "OK" #charset: "UTF-8" } |
Security Voters (3)
affirmative
Strategy