Security Token
Malloivan110@gmail.com
Username
Authenticated
Property | Value |
---|---|
Roles |
[
"ROLE_CUSTOMER"
]
|
Inherited Roles | none |
Token | Symfony\Component\Security\Core\Authentication\Token\UsernamePasswordToken {#1018 -credentials: null -providerKey: "login_api" -user: App\Entity\Customer {#734 …} -roleNames: [ "ROLE_CUSTOMER" ] -authenticated: true -attributes: [] } |
Security Firewall
login_api
Name
Security enabled
Stateless
Allows anonymous
Configuration
Key | Value |
---|---|
provider | security.user.provider.concrete.jwt_user_provider |
context | (none) |
entry_point | (none) |
user_checker | security.user_checker |
access_denied_handler | (none) |
access_denied_url | (none) |
listeners | [ "json_login" "anonymous" ] |
Listeners
Listener | Duration | Response |
---|---|---|
Symfony\Component\Security\Http\Firewall\ChannelListener {#238 -map: Symfony\Component\Security\Http\AccessMap {#239 …} -authenticationEntryPoint: Symfony\Component\Security\Http\EntryPoint\RetryAuthenticationEntryPoint {#259 …} -logger: Symfony\Bridge\Monolog\Logger {#231 …} } |
0.00 ms | (none) |
Symfony\Component\Security\Http\Firewall\UsernamePasswordJsonAuthenticationListener {#261 -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#318 …} -authenticationManager: Symfony\Component\Security\Core\Authentication\AuthenticationProviderManager {#262 …} -httpUtils: Symfony\Component\Security\Http\HttpUtils {#230 …} -providerKey: "login_api" -successHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationSuccessHandler {#265 …} -failureHandler: Symfony\Component\Security\Http\Authentication\CustomAuthenticationFailureHandler {#277 …} -options: [ "username_path" => "email" "password_path" => "password" "check_path" => "/api/login_check" "use_forward" => false "require_previous_session" => false ] -logger: Symfony\Bridge\Monolog\Logger {#231 …} -eventDispatcher: Symfony\Component\HttpKernel\Debug\TraceableEventDispatcher {#417 …} -propertyAccessor: Symfony\Component\PropertyAccess\PropertyAccessor {#279 …} -sessionStrategy: Symfony\Component\Security\Http\Session\SessionAuthenticationStrategy {#183 …} } |
602.58 ms | Lexik\Bundle\JWTAuthenticationBundle\Response\JWTAuthenticationSuccessResponse {#1020 #data: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3Mzc4MjYzNzcsImV4cCI6MTczNzgyOTk3Nywicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6Ik1hbGxvaXZhbjExMEBnbWFpbC5jb20ifQ.foLkrRA25efYnzncLtd2RUsEg7r4POM_s06Zo2u2XG-Z0dmW9tbQt92OuJ2rqbyI3AyJU3Ul6HBeYSiGMiDyWjbkLq9u0wEpDnwyfv53P01i3WjnZPVp6xm9cmC2qVNKxIMOO1gt8qkNAXh6wdBl3b4eSuWMYij1ERRknYQJ61C1YV0IntUX1vU1K72XvaP2rE_A5XvhBd64T8RV1hj1lrBWXYGiOhMXHPHmIW0MIrBYnZX2guqaoFHA2e_5bb00CkGTfWygu2Ppf5wEtY2gyoLdOL2aXWSab_qp5QtSdaOF2_ZyoGXmkDzbm9Hlz2m0FA23lL3a8g4gtrCrYyNu0lJQD5n0KCuCvBrn96GzidjcbnyHnTn1nkmUcZE5t-7_lh7T0p5_x8jA3qlfnG-EA-lKRZaG4zd5Z2UQeVMJNnhsJDBxTg-SsVX9OZ1CnZd1OHrO5-l2PL2OoHZwREje8pWdAbaZ8QG8y1U-WmP2vpUkOaD1Ck8okAY0bBjO7s7PAhfDvszzw5MNsfTyqQ4mBeZRcoFQRSPlUnxqQqfUOWRv0hgWEjdxyRefmIgkW7c0rkb7uk5gRoigjNjP7CgdBtgDLL-BtkwDORu5OQGSnxb3gzBdHzQj2X_GdRZsFUbIPAuUKxuYYLGkqniMwS77L_-6GijJflik4mT-uSy_V4M","name":"Ivani","id":26827,"refresh_token":"af53a27772b9e3e85123edbcdb77c05a7e8691b2b058b9fe267d55996fcd25a0b6a292bead282fb9aa80f14c7cde62a2cc9d8990a843aa8e67b9b049d7cb32d4"}" #callback: null #encodingOptions: 15 +headers: Symfony\Component\HttpFoundation\ResponseHeaderBag {#1086 …} #content: "{"token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpYXQiOjE3Mzc4MjYzNzcsImV4cCI6MTczNzgyOTk3Nywicm9sZXMiOlsiUk9MRV9DVVNUT01FUiJdLCJ1c2VybmFtZSI6Ik1hbGxvaXZhbjExMEBnbWFpbC5jb20ifQ.foLkrRA25efYnzncLtd2RUsEg7r4POM_s06Zo2u2XG-Z0dmW9tbQt92OuJ2rqbyI3AyJU3Ul6HBeYSiGMiDyWjbkLq9u0wEpDnwyfv53P01i3WjnZPVp6xm9cmC2qVNKxIMOO1gt8qkNAXh6wdBl3b4eSuWMYij1ERRknYQJ61C1YV0IntUX1vU1K72XvaP2rE_A5XvhBd64T8RV1hj1lrBWXYGiOhMXHPHmIW0MIrBYnZX2guqaoFHA2e_5bb00CkGTfWygu2Ppf5wEtY2gyoLdOL2aXWSab_qp5QtSdaOF2_ZyoGXmkDzbm9Hlz2m0FA23lL3a8g4gtrCrYyNu0lJQD5n0KCuCvBrn96GzidjcbnyHnTn1nkmUcZE5t-7_lh7T0p5_x8jA3qlfnG-EA-lKRZaG4zd5Z2UQeVMJNnhsJDBxTg-SsVX9OZ1CnZd1OHrO5-l2PL2OoHZwREje8pWdAbaZ8QG8y1U-WmP2vpUkOaD1Ck8okAY0bBjO7s7PAhfDvszzw5MNsfTyqQ4mBeZRcoFQRSPlUnxqQqfUOWRv0hgWEjdxyRefmIgkW7c0rkb7uk5gRoigjNjP7CgdBtgDLL-BtkwDORu5OQGSnxb3gzBdHzQj2X_GdRZsFUbIPAuUKxuYYLGkqniMwS77L_-6GijJflik4mT-uSy_V4M","name":"Ivani","id":26827,"refresh_token":"af53a27772b9e3e85123edbcdb77c05a7e8691b2b058b9fe267d55996fcd25a0b6a292bead282fb9aa80f14c7cde62a2cc9d8990a843aa8e67b9b049d7cb32d4"}" #version: "1.1" #statusCode: 200 #statusText: "OK" #charset: "UTF-8" } |
Security Voters (3)
affirmative
Strategy