Download the PHP package tuupola/slim-basic-auth without Composer
On this page you can find all versions of the php package tuupola/slim-basic-auth. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download tuupola/slim-basic-auth
More information about tuupola/slim-basic-auth
Files in tuupola/slim-basic-auth
Package slim-basic-auth
Short Description PSR-7 and PSR-15 HTTP Basic Authentication Middleware
License MIT
Homepage https://appelsiini.net/projects/slim-basic-auth
Informations about the package slim-basic-auth
PSR-7 and PSR-15 Basic Auth Middleware
This middleware implements HTTP Basic Authentication. It was originally developed for Slim but can be used with all frameworks using PSR-7 or PSR-15 style middlewares. It has been tested with Slim Framework and Zend Expressive.
Heads up! You are reading documentation for 3.x branch which is PHP 7.1 and up only. If you are using older version of PHP see the 2.x branch. These two branches are not backwards compatible, see UPGRADING for instructions how to upgrade.
Install
Install latest version using composer.
Usage
Configuration options are passed as an array. Only mandatory parameter is users
. This is an array where you pass one or more "username" => "password"
combinations. Username is the key and password is the value.
Same with Zend Expressive.
Rest of the examples assume you are using Slim Framework.
Cleartext passwords are only good for quick testing. You probably want to use hashed passwords. Hashed password can be generated with htpasswd
command line tool or password_hash() PHP function
Even if you are using hashed passwords it is not the best idea to store credentials in the code. Instead you could store them in environment or external file which is not committed to GitHub.
Optional parameters
Path
The optional path
parameter allows you to specify the protected part of your website. It can be either a string or an array. You do not need to specify each URL. Instead think of path
setting as a folder. In the example below everything starting with /api
will be authenticated.
Ignore
With optional ignore
parameter you can make exceptions to path
parameter. In the example below everything starting with /api
and /admin
will be authenticated with the exception of /api/token
and /admin/ping
which will not be authenticated.
Before
Before function is called only when authentication succeeds but before the next incoming middleware is called. You can use this to alter the request before passing it to the next incoming middleware in the stack. If it returns anything else than \Psr\Http\Message\RequestInterface
the return value will be ignored.
After
After function is called only when authentication succeeds and after the incoming middleware stack has been called. You can use this to alter the response before passing it next outgoing middleware in the stack. If it returns anything else than \Psr\Http\Message\ResponseInterface
the return value will be ignored.
Security
Basic authentication transmits credentials in clear text. For this reason HTTPS should always be used together with basic authentication. If the middleware detects insecure usage over HTTP it will throw a RuntimeException
with the following message: Insecure use of middleware over HTTP denied by configuration
.
By default, localhost is allowed to use HTTP. The security behavior of HttpBasicAuthentication
can also be configured to allow:
- a whitelist of domains to connect insecurely
- forwarding of an HTTPS connection to HTTP
- all unencrypted traffic
How to configure a whitelist:
You can list hosts to allow access insecurely. For example, to allow HTTP traffic to your development host dev.example.com
, add the hostname to the relaxed
config key.
Allow HTTPS termination and forwarding
If public traffic terminates SSL on a load balancer or proxy and forwards to the application host insecurely, HttpBasicAuthentication
can inspect request headers to ensure that the original client request was initiated securely. To enable, add the string headers
to the relaxed
config key.
Allow all unencrypted traffic
To allow insecure usage by any host, you must enable it manually by setting secure
to false
. This is generally a bad idea. Use only if you know what you are doing.
Custom authentication methods
Sometimes passing users in an array is not enough. To authenticate against custom datasource you can pass a callable as authenticator
parameter. This can be either a class which implements AuthenticatorInterface or anonymous function. Callable receives an array containing user
and password
as argument. In both cases authenticator must return either true
or false
.
If you are creating an Enterprise™ software which randomly lets people log in you could use the following.
Same thing can also be accomplished with anonymous function.
Setting response body when authentication fails
By default plugin returns an empty response body with 401 response. You can return custom body using by providing an error handler. This is useful for example when you need additional information why authentication failed.
Usage with PDO
For those in hurry there is a ready made PDO authenticator. It covers most of the use cases. You probably end up implementing your own though.
For better explanation see Basic Authentication from Database blog post.
Usage with FastCGI
By default Apache does not pass credentials to FastCGI process. If you are using mod_fcgi you can configure authorization headers with:
Testing
You can run tests either manually or automatically on every code change. Automatic tests require entr to work.
Contributing
Please see CONTRIBUTING for details.
Security
If you discover any security related issues, please email [email protected] instead of using the issue tracker.
License
The MIT License (MIT). Please see LICENSE for more information.
All versions of slim-basic-auth with dependencies
psr/http-message Version ^1.0.1|^2.0
psr/http-server-middleware Version ^1.0
tuupola/callable-handler Version ^0.3.0|^0.4.0|^1.0
tuupola/http-factory Version ^0.4.0|^1.0.2