Wiki articles tagged with "authentication"

Showing 1-20 of 25 items.

JWT authentication tutorial

Created 5 days ago by Allan Jensen, updated 5 days ago by Allan Jensen.

JWT is short for JSON Web Token. It is used eg. instead of sessions to maintain a login in a browser that is talking to an API - since browser sessions are vulnerable to CSRF security issues. JWT is also less complicated than setting up an OAuth authentication mechanism.

1 0
2 followers
Viewed: 320 times
Version: 2.0
Category: Tutorials

Using multiple models in an identity

Created 2 years ago by samdark, updated 2 years ago by samdark.

Let's assume we have two models: Customer and Supplier and we want both to log in. Yii is quite flexible when it comes to authentication and authorization so it's possible.

8 2
3 followers
Viewed: 28 345 times
Version: 2.0
Category: How-tos

How to login from different tables in Yii2

Created 3 years ago by AndroideLP, updated a year ago by lenovo.

The Problem: Yii2 utilizes by default UserIdentity configured in config/web.php for connection, this object apply one table to authentication ('identityClass' => 'app\panel\models\User'). How to authentication from diferent tables? Solution: Create instances in web.php to uses UserIdentify. eg:

5 0
6 followers
Viewed: 40 267 times
Version: 2.0
Category: How-tos

Make the authentication more securely

Created 6 years ago by Kostas Apazidis (KonApaz), updated 6 years ago by Kostas Apazidis (KonApaz).

Suppose a hacker has an account of your website He could set the PHPSESSID to empty After of that He login in your system The PHPSESSID remains blank and user has already logged with this session

2 0
3 followers
Viewed: 11 909 times
Version: 1.1
Category: Tutorials

HOW TO: Use token based authentication

Created 7 years ago by le_top, updated 7 years ago by CeBe.

After reading the other wiki article regarding token based access, I thought that it might be interesting to share my method.

2 0
10 followers
Viewed: 37 914 times
Version: 1.1
Category: How-tos

How-To: Create Token Authenticated Web Services

Created 7 years ago by hemc, updated 7 years ago by CeBe.

This article is about implementing authentication to Yii based web services.

4 0
15 followers
Viewed: 34 303 times
Version: 1.1
Category: How-tos

Yii User and Rights Implementation

Created 7 years ago by Rajith R, updated 7 years ago by Rajith R.

implementing some features of yii user and rights.

4 0
9 followers
Viewed: 35 333 times
Version: 1.1
Category: How-tos

Yet another implementation of CPhpAuthManager.

Created 8 years ago by seenivasan, updated 8 years ago by seenivasan.

In this wiki, I try to implement a simple authorization schema without putting much logic inside a file or into database table. We are constructing authorization hierarchy inside the controller. We are getting roles for the current user from database table and assigning only roles to user that are declared in the particular controller. We have brought down the work of loading of auth data at ma...

5 1
7 followers
Viewed: 16 315 times
Version: 1.1
Category: How-tos

Integrating HybridAuth directly into Yii without an extension

Created 8 years ago by biz dev, updated 8 years ago by biz dev.

This article tries to explain the steps required in integrating the HybridAuth into Yii directly, without using an extension.

10 0
15 followers
Viewed: 47 686 times
Version: 1.1
Category: How-tos

Kickstart development with Yii-App

Created 8 years ago by Chris83, updated 8 years ago by Chris83.

I recently created a project called Yii-App on GitHub to kickstart my development of smaller Yii applications. The main goal of the project is to provide a ready-to-use application template that includes my bootstrap extension and many other useful extensions. After reading this article you will be able to use...

14 0
40 followers
Viewed: 37 448 times
Version: 1.1
Category: How-tos

Use crypt() for password storage

Created 8 years ago by fsb, updated 6 years ago by fsb.

Update: This wiki has been rewritten to be in line with Yii 1.1.14. Since many of the detailed complexities are now handled by Yii, the article focuses on how the crypt() built-in function works and why it's important to use it correctly.

15 0
21 followers
Viewed: 125 821 times
Version: 1.1
Category: Tutorials

Installing Yii Users and Rights to Newly Created Yii app

Created 8 years ago by Rajith R, updated 7 years ago by Rajith R.

After creating an yii app . we need to implement permission, Authentication and Authorization .so the best way is to use the Yii users and Rights modules.

11 1
40 followers
Viewed: 101 291 times
Version: 1.1
Category: Tutorials

Show captcha after <N> unsuccessfull attempts

Created 8 years ago by zitter, updated 8 years ago by zitter.

In this mini howto I would like to show how to add a required captcha field in the login form, after a defined number of unsuccessfull attempts. To do this, I will use the blog demo that you have in default Yii download package (path/to/yii/demos/blog).

13 4
15 followers
Viewed: 29 401 times
Version: 1.1
Category: How-tos

Simple RBAC

Created 9 years ago by hasanavi, updated 8 years ago by Stageline.

If you need simple Role based access control without the long RBAC process then this article is just for you. Lets jump to the point.

33 1
43 followers
Viewed: 108 492 times
Version: 1.1
Category: Tutorials

How to write secure Yii1 applications

Created 9 years ago by François Gannaz, updated a month ago by François Gannaz.
  • Validate the user input (see below for details).
  • Protect (escape) your application output according to context (see below for a few output types, mostly HTML and SQL).
  • Test your application in debug mode.
    Set the constant YII_DEBUG to true (by default, it is defined in index.php) and put alongside error_reporting(E_ALL);. Then errors and warnings will stop the execution an...
80 0
114 followers
Viewed: 288 590 times
Version: 1.1
Category: How-tos

Authenticating against phpass hashes with Yii

Created 9 years ago by Da:Sourcerer, updated 7 years ago by Da:Sourcerer.
  • iteration_count_log2 controls the number of iterations for key stretching. A setting of 8 means the hash algorithm will be applied 2^8 = 256 times. This setting should be kept between 4 and 31.
  • portable_hashes controls whether portable hashes should be used or not. Portable hashes are salted MD5 hashes prefixed by $P$.
22 0
28 followers
Viewed: 35 521 times
Version: 1.1
Category: How-tos

Implementing a User Level Access System

Created 10 years ago by Antonio Ramirez, updated 7 years ago by Phil Loaiza.

Please note that this article is a simple example and good security should be taken into account when we play with authentication systems.

27 0
37 followers
Viewed: 64 162 times
Version: 1.1
Category: Tutorials

Introducción al control de acceso basado en roles (RBAC)

Created 10 years ago by Juan Calvo, updated 10 years ago by Juan Calvo.

Todos los que hemos empezado a utilizar Yii para crear aplicaciones Web, nos hemos dado de bruces cuando hemos intentado poner a funcionar el RBAC (acceso de control basado en roles).

15 1
9 followers
Viewed: 67 120 times
Version: 1.1
Category: Tutorials

Module based login

Created 10 years ago by suriyansuresh, updated 10 years ago by suriyansuresh.

If you want to add module based login to a site without using RBAC, please follow these guidelines.

13 0
18 followers
Viewed: 66 696 times
Version: 1.1
Category: Tutorials

Installing and configuring the Yii User Management Module under a fresh skeleton application generated by yiic

Created 11 years ago by thyseus, updated 10 years ago by Orteko.

p.s. latest version of this tutorial is always available unter the docs/ folder of the User Management Module.

12 2
15 followers
Viewed: 89 867 times
Version: 1.1
Category: Tutorials