Wiki articles tagged with "authentication"

Showing 1-20 of 25 items.

JWT authentication tutorial

Created 3 years ago by Allan Jensen, updated 3 years ago by Allan Jensen.

JWT is short for JSON Web Token. It is used eg. instead of sessions to maintain a login in a browser that is talking to an API - since browser sessions are vulnerable to CSRF security issues. JWT is also less complicated than setting up an OAuth authentication mechanism.

13 0
8 followers
Viewed: 163 483 times
Version: 2.0
Category: Tutorials

Using multiple models in an identity

Created 6 years ago by samdark, updated 2 months ago by Néstor Acevedo.

Let's assume we have two models: Customer and Supplier and we want both to log in. Yii is quite flexible when it comes to authentication and authorization so it's possible.

9 2
5 followers
Viewed: 36 686 times
Version: 2.0
Category: How-tos

How to login from different tables in Yii2

Created 6 years ago by AndroideLP, updated 4 years ago by lenovo.

The Problem: Yii2 utilizes by default UserIdentity configured in config/web.php for connection, this object apply one table to authentication ('identityClass' => 'app\panel\models\User'). How to authentication from diferent tables? Solution: Create instances in web.php to uses UserIdentify. eg:

5 0
6 followers
Viewed: 64 246 times
Version: 2.0
Category: How-tos

Make the authentication more securely

Created 10 years ago by Kostas Apazidis (KonApaz), updated 10 years ago by Kostas Apazidis (KonApaz).

Suppose a hacker has an account of your website He could set the PHPSESSID to empty After of that He login in your system The PHPSESSID remains blank and user has already logged with this session

2 0
3 followers
Viewed: 16 119 times
Version: 1.1
Category: Tutorials

HOW TO: Use token based authentication

Created 10 years ago by le_top, updated 10 years ago by CeBe.

After reading the other wiki article regarding token based access, I thought that it might be interesting to share my method.

2 0
10 followers
Viewed: 45 090 times
Version: 1.1
Category: How-tos

How-To: Create Token Authenticated Web Services

Created 10 years ago by hemc, updated 10 years ago by CeBe.

This article is about implementing authentication to Yii based web services.

4 0
15 followers
Viewed: 38 479 times
Version: 1.1
Category: How-tos

Yii User and Rights Implementation

Created 11 years ago by Rajith R, updated 10 years ago by Rajith R.

implementing some features of yii user and rights.

4 0
8 followers
Viewed: 42 557 times
Version: 1.1
Category: How-tos

Yet another implementation of CPhpAuthManager.

Created 11 years ago by seenivasan, updated 11 years ago by seenivasan.

In this wiki, I try to implement a simple authorization schema without putting much logic inside a file or into database table. We are constructing authorization hierarchy inside the controller. We are getting roles for the current user from database table and assigning only roles to user that are declared in the particular controller. We have brought down the work of loading of auth data at ma...

5 1
7 followers
Viewed: 19 682 times
Version: 1.1
Category: How-tos

Integrating HybridAuth directly into Yii without an extension

Created 11 years ago by biz dev, updated 11 years ago by biz dev.

This article tries to explain the steps required in integrating the HybridAuth into Yii directly, without using an extension.

10 0
15 followers
Viewed: 51 888 times
Version: 1.1
Category: How-tos

Kickstart development with Yii-App

Created 11 years ago by Chris83, updated 11 years ago by Chris83.

I recently created a project called Yii-App on GitHub to kickstart my development of smaller Yii applications. The main goal of the project is to provide a ready-to-use application template that includes my bootstrap extension and many other useful extensions. After reading this article you will be able to use...

14 0
40 followers
Viewed: 41 566 times
Version: 1.1
Category: How-tos

Use crypt() for password storage

Created 11 years ago by fsb, updated 9 years ago by fsb.

Update: This wiki has been rewritten to be in line with Yii 1.1.14. Since many of the detailed complexities are now handled by Yii, the article focuses on how the crypt() built-in function works and why it's important to use it correctly.

15 0
20 followers
Viewed: 179 283 times
Version: 1.1
Category: Tutorials

Installing Yii Users and Rights to Newly Created Yii app

Created 11 years ago by Rajith R, updated 10 years ago by Rajith R.

After creating an yii app . we need to implement permission, Authentication and Authorization .so the best way is to use the Yii users and Rights modules.

11 1
40 followers
Viewed: 108 877 times
Version: 1.1
Category: Tutorials

Show captcha after <N> unsuccessfull attempts

Created 12 years ago by zitter, updated 12 years ago by zitter.

In this mini howto I would like to show how to add a required captcha field in the login form, after a defined number of unsuccessfull attempts. To do this, I will use the blog demo that you have in default Yii download package (path/to/yii/demos/blog).

13 4
15 followers
Viewed: 35 293 times
Version: 1.1
Category: How-tos

Simple RBAC

Created 12 years ago by hasanavi, updated 12 years ago by Stageline.

If you need simple Role based access control without the long RBAC process then this article is just for you. Lets jump to the point.

33 1
43 followers
Viewed: 120 257 times
Version: 1.1
Category: Tutorials

How to write secure Yii1 applications

Created 12 years ago by François Gannaz, updated 3 years ago by François Gannaz.
  • Validate the user input (see below for details).
  • Protect (escape) your application output according to context (see below for a few output types, mostly HTML and SQL).
  • Test your application in debug mode.
    Set the constant YII_DEBUG to true (by default, it is defined in index.php) and put alongside error_reporting(E_ALL);. Then errors and warnings will stop the execution an...
80 0
114 followers
Viewed: 314 781 times
Version: 1.1
Category: How-tos

Authenticating against phpass hashes with Yii

Created 13 years ago by Da:Sourcerer, updated 10 years ago by Da:Sourcerer.
  • iteration_count_log2 controls the number of iterations for key stretching. A setting of 8 means the hash algorithm will be applied 2^8 = 256 times. This setting should be kept between 4 and 31.
  • portable_hashes controls whether portable hashes should be used or not. Portable hashes are salted MD5 hashes prefixed by $P$.
22 0
28 followers
Viewed: 40 154 times
Version: 1.1
Category: How-tos

Implementing a User Level Access System

Created 13 years ago by Antonio Ramirez, updated 10 years ago by Phil Loaiza.

Please note that this article is a simple example and good security should be taken into account when we play with authentication systems.

27 0
37 followers
Viewed: 71 634 times
Version: 1.1
Category: Tutorials

Introducción al control de acceso basado en roles (RBAC)

Created 13 years ago by Juan Calvo, updated 13 years ago by Juan Calvo.

Todos los que hemos empezado a utilizar Yii para crear aplicaciones Web, nos hemos dado de bruces cuando hemos intentado poner a funcionar el RBAC (acceso de control basado en roles).

15 1
9 followers
Viewed: 74 538 times
Version: 1.1
Category: Tutorials

Module based login

Created 14 years ago by suriyansuresh, updated 14 years ago by suriyansuresh.

If you want to add module based login to a site without using RBAC, please follow these guidelines.

13 0
18 followers
Viewed: 91 641 times
Version: 1.1
Category: Tutorials

Installing and configuring the Yii User Management Module under a fresh skeleton application generated by yiic

Created 14 years ago by thyseus, updated 14 years ago by Orteko.

p.s. latest version of this tutorial is always available unter the docs/ folder of the User Management Module.

12 2
15 followers
Viewed: 96 262 times
Version: 1.1
Category: Tutorials