library password-policy-bundle
Password policy enforcements
despark/password-policy-bundle
Password policy enforcements
- Thursday, July 26, 2018
- by lsimeonov
- Repository
- 4 Watchers
- 0 Stars
- 46 Installations
- PHP
- 0 Dependents
- 0 Suggesters
- 0 Forks
- 0 Open issues
- 5 Versions
- 0 % Grown
Password Policy Bundle
, (*1)
Installation
composer require despark/password-policy-bundle
Configuration
-
Implement Despark\PasswordPolicyBundle\Model\HasPasswordPolicyInterface in the entities
that you want to support password policies., (*2)
-
Implement Despark\PasswordPolicyBundle\Model\PasswordHistoryInterface in a new entity that will hold the password
history records., (*3)
-
Configure how Password policy will behave on every entity. Configuration example is here, (*4)
-
You need to add @PasswordPolicy() validation rules to your $plainPassword field, (*5)
Configuration example:
password_policy:
entities:
# the entity class implementing HasPasswordPolicyInterface
App\Entity\Participant:
# The route where the user will be locked when password is expired
lock_route: participant_profile
# Params to pass to the locked param when build.
lock_route_params:
locked: '1'
# Which is the password property in the entity (defaults to 'password')
password_field: ~
# Password history property in the entity (default to 'passwordHistory')
password_history_field: ~
# How many password changes to track (defaults to 3)
passwords_to_remember: ~
# Force expiry of the password in that many days
expiry_days: ~
App\Entity\User:
lock_route: admin_app_user_edit
lock_route_params:
# {id} will paresed as current user id when possible
id: '{id}'
expiry_listener:
# You can change the expiry listener priority
priority: 0
error_msg:
text: 'Your password expired. You need to change it'
type: 'error'
listener_priority: 0
# The route that needs to be shown to the user when password is expired
lock_route: participant_settings
# These routes will be excluded from the expiry check
excluded_routes: ~
Expiry
Expiry works by checking last password change on every request made to the app, excluding those configured in the application, (*6)
Good to know
The library uses doctrine lifecycle events to create password history and set last password change on the target entities.
In order for this to happen we use the onFlush event and we are recalculating the history change set inside it.
You must be aware of that as any entity changes after the recalculation will not be persisted to the database., (*7)
dev-master
9999999-dev
Password policy enforcements
Sources
Download
MIT
The Requires
The Development Requires
v0.1.3
0.1.3.0
Password policy enforcements
Sources
Download
MIT
The Requires
The Development Requires
v0.1.2
0.1.2.0
Password policy enforcements
Sources
Download
MIT
The Requires
The Development Requires
v0.1.1
0.1.1.0
Password policy enforcements
Sources
Download
MIT
The Requires
The Development Requires
v0.1.0
0.1.0.0
Password policy enforcements
Sources
Download
MIT
The Requires
The Development Requires