@@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself:
193
193
access_control :
194
194
#
195
195
# the 'ips' option supports IP addresses and subnet masks
196
- - { path: ^/internal, roles: IS_AUTHENTICATED_ANONYMOUSLY , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
196
+ - { path: ^/internal, roles: IS_AUTHENTICATED , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
197
197
- { path: ^/internal, roles: ROLE_NO_ACCESS }
198
198
199
199
.. code-block :: xml
@@ -210,7 +210,7 @@ pattern so that it is only accessible by requests from the local server itself:
210
210
<!-- ... -->
211
211
212
212
<!-- the 'ips' option supports IP addresses and subnet masks -->
213
- <rule path =" ^/internal" role =" IS_AUTHENTICATED_ANONYMOUSLY " >
213
+ <rule path =" ^/internal" role =" IS_AUTHENTICATED " >
214
214
<ip >127.0.0.1</ip >
215
215
<ip >::1</ip >
216
216
</rule >
@@ -227,7 +227,7 @@ pattern so that it is only accessible by requests from the local server itself:
227
227
'access_control' => [
228
228
[
229
229
'path' => '^/internal',
230
- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
230
+ 'role' => 'IS_AUTHENTICATED ',
231
231
// the 'ips' option supports IP addresses and subnet masks
232
232
'ips' => ['127.0.0.1', '::1'],
233
233
],
@@ -254,8 +254,8 @@ But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback
254
254
address):
255
255
256
256
* Now, the first access control rule is enabled as both the ``path `` and the
257
- ``ip `` match: access is allowed as the user always has the
258
- ``IS_AUTHENTICATED_ANONYMOUSLY `` role .
257
+ ``ip `` match: access is allowed as the user always matches the
258
+ ``IS_AUTHENTICATED `` attribute .
259
259
260
260
* The second access rule is not examined as the first rule matched.
261
261
@@ -342,7 +342,7 @@ access those URLs via a specific port. This could be useful for example for
342
342
security :
343
343
# ...
344
344
access_control :
345
- - { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY , port: 8080 }
345
+ - { path: ^/cart/checkout, roles: IS_AUTHENTICATED , port: 8080 }
346
346
347
347
.. code-block :: xml
348
348
@@ -357,7 +357,7 @@ access those URLs via a specific port. This could be useful for example for
357
357
<config >
358
358
<!-- ... -->
359
359
<rule path =" ^/cart/checkout"
360
- role =" IS_AUTHENTICATED_ANONYMOUSLY "
360
+ role =" IS_AUTHENTICATED "
361
361
port =" 8080"
362
362
/>
363
363
</config >
@@ -371,7 +371,7 @@ access those URLs via a specific port. This could be useful for example for
371
371
'access_control' => [
372
372
[
373
373
'path' => '^/cart/checkout',
374
- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
374
+ 'role' => 'IS_AUTHENTICATED ',
375
375
'port' => '8080',
376
376
],
377
377
],
@@ -393,7 +393,7 @@ the user will be redirected to ``https``:
393
393
security :
394
394
# ...
395
395
access_control :
396
- - { path: ^/cart/checkout, roles: IS_AUTHENTICATED_ANONYMOUSLY , requires_channel: https }
396
+ - { path: ^/cart/checkout, roles: IS_AUTHENTICATED , requires_channel: https }
397
397
398
398
.. code-block :: xml
399
399
@@ -408,7 +408,7 @@ the user will be redirected to ``https``:
408
408
<config >
409
409
<!-- ... -->
410
410
<rule path =" ^/cart/checkout"
411
- role =" IS_AUTHENTICATED_ANONYMOUSLY "
411
+ role =" IS_AUTHENTICATED "
412
412
requires-channel =" https"
413
413
/>
414
414
</config >
@@ -422,7 +422,7 @@ the user will be redirected to ``https``:
422
422
'access_control' => [
423
423
[
424
424
'path' => '^/cart/checkout',
425
- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
425
+ 'role' => 'IS_AUTHENTICATED ',
426
426
'requires_channel' => 'https',
427
427
],
428
428
],
0 commit comments