I'm looking for a bundle to integrate CAS authentication on Symfony 2.3. I found these options and the truth is I'm not convinced any, since almost all bundles seem to be abandoned without updating.
1.- sensiolabs / CasBundle: https://github.com/sensiolabs/CasBundle The documentation is sparse and incomplete. I have not found any examples of how to use it.
2.- BeSimple / BeSimpleSsoAuthBundle: https://github.com/BeSimple/BeSimpleSsoAuthBundle With this I'm testing and I am having some problems. I think I'm on the 4th problem solved and I get behind another.
3.- Symfony CAS Client: https://wiki.jasig.org/display/CASC/Symfony+CAS+Client Totally outdated
Really, there are so few options to authenticate with CAS in symfony?
I have the same issue before and i resolved it using BeSimpleSsoAuthBundle but you have to make a few changes : Supposed that you have your user entity has been already implemented in your UserBundle, with a unique attribute sgid you have to override : 1- BeSimple\SsoAuthBundle\Security\Core\User :
<?php
namespace Application\UserBundle\Security\BeSimple\SpawnedUserProvider;
use BeSimple\SsoAuthBundle\Security\Core\User\SpawnedUserProvider;
use Symfony\Component\Security\Core\User\UserInterface;
use Symfony\Component\Security\Core\User\User;
use Symfony\Component\HttpFoundation\RedirectResponse;
class SsoUserProvider extends SpawnedUserProvider
{
/**
* @var array
*/
private $roles;
/**
* Constructor.
*
* @param array $roles An array of roles
*/
private $entityManager;
private $securityContext;
public function __construct($em, $securityContext) {
$this->em = $em;
$this->securityContext = $securityContext;
}
/**
* {@inheritdoc}
*/
public function loadUserByUsername($username)
{
$session = $this->securityContext;
$qb = $this->em->createQueryBuilder();
$qb->select("u")
->from('ApplicationUserBundle:User', 'u')
->where('u.sgid = :sgid')
->AndWhere('u.status = 1')
->setParameter("sgid", $username);
$result = $qb->getQuery()->getOneOrNullResult();
if ($result == NULL) {
$session->getFlashBag()->add('error', 'Vous ne pouvez pas vous connecter car votre compte est désactivé');
return new RedirectResponse('login');
}
$user_name = $result->getFirstName().' '.$result->getLastName();
$session->set('userId', $result->getId());
if ($result->getUserType() == 1) {
$this->roles = array('ROLE_ADMIN');
}else if ($result->getUserType() == 0){
$this->roles = array('ROLE_USER');
}else{
$session->getFlashBag()->add('error', 'Vous ne pouvez pas vous connecter car votre compte n\'a pas de rôle');
return new RedirectResponse('logout');
}
return $this->spawnUser($user_name);
}
/**
* {@inheritDoc}
*/
public function refreshUser(UserInterface $user)
{
if (!$user instanceof User) {
throw new UnsupportedUserException(sprintf('Instances of "%s" are not supported.', get_class($user)));
}
return $this->spawnUser($user->getUsername());
}
/**
* {@inheritDoc}
*/
public function supportsClass($class)
{
return $class === 'Symfony\Component\Security\Core\User\User';
}
/**
* Spawns a new user with given username.
*
* @param string $username
*
* @return \Symfony\Component\Security\Core\User\User
*/
private function spawnUser($username)
{
//$this->roles = $this->userType;
return new User($username, null, (array)$this->roles, true, true, true, true);
}
}
2- Override also BeSimple\SsoAuthBundle\Security\Core\Authentication\Provider :
<?php
namespace Application\UserBundle\Security\BeSimple\Authentication\Provider;
use Symfony\Component\Security\Core\User\UserInterface;
use Symfony\Component\Security\Core\Exception\UsernameNotFoundException;
use Symfony\Component\Security\Core\Exception\BadCredentialsException;
use BeSimple\SsoAuthBundle\Security\Core\User\UserFactoryInterface;
/*
* @Override
*/
use BeSimple\SsoAuthBundle\Security\Core\Authentication\Provider\SsoAuthenticationPr ovider;
class AppAuthenticationProvider extends SsoAuthenticationProvider
{
/**
* @var UserProviderInterface
*/
private $userProvider;
/**
* @var bool
*/
private $createUsers;
/**
* @var bool
*/
private $hideUserNotFound;
/**
* @Override file
* @throws \Symfony\Component\Security\Core\Exception\UsernameNotFoundException
* @throws \Symfony\Component\Security\Core\Exception\BadCredentialsException
*
* @param string $username
* @param array $attributes
*
* @return UserInterface
*/
protected function provideUser($username, array $attributes = array())
{
try {
$user = $this->retrieveUser($username);
} catch (UsernameNotFoundException $notFound) {
if ($this->createUsers && $this->userProvider instanceof UserFactoryInterface) {
$user = $this->createUser($username, $attributes);
} elseif ($this->hideUserNotFound) {
throw new BadCredentialsException('Bad credentials', 0, $notFound);
} else {
throw $notFound;
}
}
return $user;
}
}
3- When user login to your application save needed information in session :
<?php
namespace Application\UserBundle\Security\Authentication\Handler;
use Symfony\Component\HttpFoundation\Request;
use Symfony\Component\HttpFoundation\RedirectResponse;
use Symfony\Component\Routing\Router;
use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
use Symfony\Component\Security\Core\SecurityContext;
use Symfony\Component\Security\Http\Authentication\AuthenticationSuccessHandlerInterface;
use Doctrine\ORM\EntityManager;
class LoginSuccessHandler implements AuthenticationSuccessHandlerInterface
{
protected
$router,
$security,
$entityManager;
public function __construct(Router $router, SecurityContext $security, EntityManager $entityManager)
{
$this->router = $router;
$this->security = $security;
$this->entityManager = $entityManager;
}
public function onAuthenticationSuccess(Request $request, TokenInterface $token)
{
$session = $request->getSession();
$attributes = $this->security->getToken()->getAttributes();
$sgid = $attributes['sso:validation']['sgid'];
$em = $this->entityManager;
$qb = $em->createQueryBuilder();
$qb->select("u")
->from('ApplicationUserBundle:User', 'u')
->where('u.sgid = :sgid')
->AndWhere('u.status = 1')
->setParameter("sgid", $sgid);
$result = $qb->getQuery()->getOneOrNullResult();
//en cas où utilisateur est désactivée
//Malgre que si il arrive a cette handler ça veut dire qu'il activé car le test se fait sur le bundle BeSimple
if ($result == NULL) {
return new RedirectResponse($this->router->generate('login'));
}
$session->set('userId', $result->getId());
$response = new RedirectResponse('admin');
return $response;
}
}
4- Now define a security listner in Application/UserBundle/Ressources/config/security_listeners.yml :
parameters:
security.authentication.provider.sso.class: Application\UserBundle\Security\BeSimple\Authentication\Provider\AppAuthenticationProvider
services:
security.authentication.provider.sso:
class: %security.authentication.provider.sso.class%
public: false
arguments: ['', '@security.user_checker', '', '', false]
5- The BeSimple configuration should be like that :
be_simple_sso_auth:
admin_sso:
protocol:
id: cas
version: 2
server:
id: cas
login_url: https://adresse ip:8443/cas-server-webapp-4.0.0/login
logout_url: https://adresse ip:8443/cas-server-webapp-4.0.0/logout
validation_url: https://adresse ip:8443/cas-server-webapp-4.0.0/serviceValidate
services:
spawned_user_provider:
class: Application\UserBundle\Security\BeSimple\SpawnedUserProvider\SsoUserProvider
arguments: [@doctrine.orm.entity_manager, @session]
6- The parameters.yml
be_simple.sso_auth.client.option.curlopt_ssl_verifypeer.value: false
be_simple.sso_auth.client.option.curlopt_sslversion.value: 4 (Optionale)
7- The security.yml
main:
pattern: ^/admin
context: marketshare_context
logout:
path: /admin/logout
target: /
#provider: sso
trusted_sso:
manager: admin_sso
login_action: ApplicationUserBundle:TrustedSso:login
logout_action: false
login_path: /admin/login
check_path: /admin/check
always_use_default_target_path: true
default_target_path: /admin/potentiel
failure_path: /admin/logout
You can also test l3-team/CasBundle
it seems more recent & active and with a clearer documentation than BeSimpleSSoBundle.
It also seems to support Single Sign Out.
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With