@@ -572,7 +572,7 @@ see :doc:`/cookbook/security/form_login`.
572
572
573
573
.. _book-security-common-pitfalls :
574
574
575
- .. sidebar :: Avoid Common Pitfalls
575
+ .. sidebar :: Avoid common Pitfalls
576
576
577
577
When setting up your login form, watch out for a few common pitfalls.
578
578
@@ -715,7 +715,7 @@ In this section, you'll focus on how to secure different resources (e.g. URLs,
715
715
method calls, etc) with different roles. Later, you'll learn more about how
716
716
roles are created and assigned to users.
717
717
718
- Securing Specific URL Patterns
718
+ Securing specific URL Patterns
719
719
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
720
720
721
721
The most basic way to secure part of your application is to secure an entire
@@ -765,7 +765,7 @@ You can define as many URL patterns as you need - each is a regular expression.
765
765
766
766
.. _security-book-access-control-explanation :
767
767
768
- Understanding how ``access_control `` works
768
+ Understanding how ``access_control `` Works
769
769
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
770
770
771
771
For each incoming request, Symfony2 checks each ``access_control `` entry
@@ -1154,7 +1154,7 @@ In the previous sections, you learned how you can protect different resources
1154
1154
by requiring a set of *roles * for a resource. This section explores
1155
1155
the other side of authorization: users.
1156
1156
1157
- Where do Users come from? (*User Providers *)
1157
+ Where do Users Come from? (*User Providers *)
1158
1158
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1159
1159
1160
1160
During authentication, the user submits a set of credentials (usually a username
@@ -1520,7 +1520,7 @@ method:
1520
1520
1521
1521
<p>Username: <?php echo $app->getUser()->getUsername() ?></p>
1522
1522
1523
- Using Multiple User Providers
1523
+ Using multiple User Providers
1524
1524
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1525
1525
1526
1526
Each authentication mechanism (e.g. HTTP Authentication, form login, etc)
@@ -1897,7 +1897,7 @@ You can also use expressions inside your templates:
1897
1897
1898
1898
For more details on expressions and security, see :ref: `book-security-expressions `.
1899
1899
1900
- Access Control Lists (ACLs): Securing Individual Database Objects
1900
+ Access Control Lists (ACLs): Securing individual Database Objects
1901
1901
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1902
1902
1903
1903
Imagine you are designing a blog system where your users can comment on your
@@ -2088,7 +2088,7 @@ algorithm; you can use the same strategy in your own code thanks to the
2088
2088
// is password1 equals to password2?
2089
2089
$bool = StringUtils::equals($password1, $password2);
2090
2090
2091
- Generating a secure Random Number
2091
+ Generating a secure random Number
2092
2092
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2093
2093
2094
2094
Whenever you need to generate a secure random number, you are highly
0 commit comments