@@ -570,7 +570,7 @@ see :doc:`/cookbook/security/form_login`.
570
570
571
571
.. _book-security-common-pitfalls :
572
572
573
- .. sidebar :: Avoid Common Pitfalls
573
+ .. sidebar :: Avoid common Pitfalls
574
574
575
575
When setting up your login form, watch out for a few common pitfalls.
576
576
@@ -713,7 +713,7 @@ In this section, you'll focus on how to secure different resources (e.g. URLs,
713
713
method calls, etc) with different roles. Later, you'll learn more about how
714
714
roles are created and assigned to users.
715
715
716
- Securing Specific URL Patterns
716
+ Securing specific URL Patterns
717
717
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
718
718
719
719
The most basic way to secure part of your application is to secure an entire
@@ -763,7 +763,7 @@ You can define as many URL patterns as you need - each is a regular expression.
763
763
764
764
.. _security-book-access-control-explanation :
765
765
766
- Understanding how ``access_control `` works
766
+ Understanding how ``access_control `` Works
767
767
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
768
768
769
769
For each incoming request, Symfony2 checks each ``access_control `` entry
@@ -1025,7 +1025,7 @@ In the previous sections, you learned how you can protect different resources
1025
1025
by requiring a set of *roles * for a resource. This section explores
1026
1026
the other side of authorization: users.
1027
1027
1028
- Where do Users come from? (*User Providers *)
1028
+ Where do Users Come from? (*User Providers *)
1029
1029
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1030
1030
1031
1031
During authentication, the user submits a set of credentials (usually a username
@@ -1390,7 +1390,7 @@ method:
1390
1390
1391
1391
<p>Username: <?php echo $app->getUser()->getUsername() ?></p>
1392
1392
1393
- Using Multiple User Providers
1393
+ Using multiple User Providers
1394
1394
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1395
1395
1396
1396
Each authentication mechanism (e.g. HTTP Authentication, form login, etc)
@@ -1671,7 +1671,7 @@ the built-in helper function:
1671
1671
idea to have a main firewall that covers all URLs (as has been shown
1672
1672
in this chapter).
1673
1673
1674
- Access Control Lists (ACLs): Securing Individual Database Objects
1674
+ Access Control Lists (ACLs): Securing individual Database Objects
1675
1675
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1676
1676
1677
1677
Imagine you are designing a blog system where your users can comment on your
@@ -1868,7 +1868,7 @@ algorithm; you can use the same strategy in your own code thanks to the
1868
1868
// is password1 equals to password2?
1869
1869
$bool = StringUtils::equals($password1, $password2);
1870
1870
1871
- Generating a secure Random Number
1871
+ Generating a secure random Number
1872
1872
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1873
1873
1874
1874
Whenever you need to generate a secure random number, you are highly
0 commit comments