This middleware implements HTTP Basic Authentication. It was originally developed for Slim but can be used with all frameworks using PSR-7 style middlewares. It has been tested with Slim Framework and Zend Expressive.
Install latest version using composer.
$ composer require tuupola/slim-basic-auth
Configuration options are passed as an array. Only mandatory parameter is users
. This is an array where you pass one or more "username" => "password"
combinations. Username is the key and password is the value. Examples assume you are using Slim Framework.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
]
]));
The optional path
parameter allows you to specify the protected part of your website. It can be either a string or an array. You do not need to specify each URL. Instead think of path
setting as a folder. In the example below everything starting with /api
will be authenticated.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/api", /* or ["/admin", "/api"] */
"realm" => "Protected",
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
]
]));
With optional passthrough
parameter you can make exceptions to path
parameter. In the example below everything starting with /api
and /admin
will be authenticated with the exception of /api/token
and /admin/ping
which will not be authenticated.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => ["/api", "/admin"],
"passthrough" => ["/api/token", "/admin/ping"],
"realm" => "Protected",
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
]
]));
Callback is called only when authentication succeeds. It receives an array containing user
and password
as argument. If callback returns boolean false
authentication is forced to be failed.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"realm" => "Protected",
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
],
"callback" => function ($request, $response, $arguments) {
print_r($arguments);
}
]));
Browsers send passwords over the wire basically as cleartext. You should always use HTTPS. If the middleware detects insecure usage over HTTP it will throw RuntimeException
. This rule is relaxed for localhost. To allow insecure usage you must enable it manually by setting secure
to false
.
Also it is not a good idea to commit credentials into GitHub. You should store them somewhere else instead.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"secure" => false,
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
]
]));
Alternatively you can list your development host to have relaxed security.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"secure" => true,
"relaxed" => ["localhost", "dev.example.com"],
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
]
]));
Sometimes passing users in an array is not enough. To authenticate against custom datasource you can pass a callable as authenticator
parameter. This can be either a class which implements AuthenticatorInterface or anonymous function. Callable receives an array containing user
and password
as argument. In both cases authenticator must return either true
or false
.
If you are creating an Enterprise™ software which randomly lets people log in you could use the following.
use \Slim\Middleware\HttpBasicAuthentication\AuthenticatorInterface;
class RandomAuthenticator implements AuthenticatorInterface {
public function __invoke(array $arguments) {
return (bool)rand(0,1);
}
}
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"realm" => "Protected",
"authenticator" => new RandomAuthenticator()
]));
Same thing can also be accomplished with anonymous function.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"realm" => "Protected",
"authenticator" => function ($arguments) {
return (bool)rand(0,1);
}
]));
By default plugin returns an empty response body with 401 response. You can return custom body using by providing an error handler. This is useful for example when you need additional information why authentication failed.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/api",
"realm" => "Protected",
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
],
"error" => function ($request, $response, $arguments) {
$data = [];
$data["status"] = "error";
$data["message"] = $arguments["message"];
return $response->write(json_encode($data, JSON_UNESCAPED_SLASHES));
}
]));
For those in hurry there is a ready made PDO authenticator. It covers most of the use cases. You probably end up implementing your own though.
use \Slim\Middleware\HttpBasicAuthentication\PdoAuthenticator;
$pdo = new \PDO("sqlite:/tmp/users.sqlite");
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"realm" => "Protected",
"authenticator" => new PdoAuthenticator([
"pdo" => $pdo
])
]));
For better explanation see Basic Authentication from Database blog post.
By default Apache does not pass credentials to FastCGI process. If you are using mod_fcgi you can configure authorization headers with:
FastCgiExternalServer /usr/lib/cgi-bin/php5-fcgi -host 127.0.0.1:9000 -pass-header Authorization
If this is not possible workaround is to pass credentials in an environment variable using mod_rewrite.
RewriteRule .* - [env=HTTP_AUTHORIZATION:%{HTTP:Authorization}]
The above rewrite rule should work out of the box. In some cases server adds REDIRECT_
prefix to environment name. In this case or if you want to use nonstandard environment use the parameter called environment
.
$app = new \Slim\App;
$app->add(new \Slim\Middleware\HttpBasicAuthentication([
"path" => "/admin",
"realm" => "Protected",
"users" => [
"root" => "t00r",
"somebody" => "passw0rd"
],
"environment" => "REDIRECT_HTTP_AUTHORIZATION"
]));
You can run tests either manually...
$ vendor/bin/phpunit
$ vendor/bin/phpcs --standard=PSR2 src/ -p
... or automatically on every code change.
$ npm install
$ grunt watch
Please see CONTRIBUTING for details.
If you discover any security related issues, please email tuupola@appelsiini.net instead of using the issue tracker.
The MIT License (MIT). Please see License File for more information.