From 39fbf025d393be62c2cb88452fc2c0fb006d4041 Mon Sep 17 00:00:00 2001 From: Tom Parkinson <121138040+tparkinson-ticsystems@users.noreply.github.com> Date: Tue, 30 Sep 2025 11:12:17 -0700 Subject: [PATCH 1/2] Address cache as array, not string Per the blog post https://symfony.com/blog/new-in-symfony-7-3-security-improvements --- security/access_token.rst | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/security/access_token.rst b/security/access_token.rst index 70c9e21980e..54e355aa4b5 100644 --- a/security/access_token.rst +++ b/security/access_token.rst @@ -1,7 +1,7 @@ How to use Access Token Authentication ====================================== -Access tokens or API tokens are commonly used as authentication mechanism +Access tokens or API tokens are a commonly used authentication mechanism in API contexts. The access token is a string, obtained during authentication (using the application or an authorization server). The access token's role is to verify the user identity and receive consent before the token is @@ -349,7 +349,7 @@ Using OpenID Connect (OIDC) `OpenID Connect (OIDC)`_ is the third generation of OpenID technology and it's a RESTful HTTP API that uses JSON as its data format. OpenID Connect is an authentication layer on top of the OAuth 2.0 authorization framework. It allows -to verify the identity of an end user based on the authentication performed by +verification of the identity of an end user based on the authentication performed by an authorization server. 1) Configure the OidcUserInfoTokenHandler @@ -434,7 +434,8 @@ Next, configure the ``base_uri`` and ``discovery`` options: oidc_user_info: base_uri: https://www.example.com/realms/demo/ discovery: - cache: cache.app + cache: + id: cache.app .. code-block:: xml @@ -744,7 +745,8 @@ from the OpenID Connect Discovery), and configure the ``discovery`` option: issuers: ['https://oidc.example.com'] discovery: base_uri: https://www.example.com/realms/demo/ - cache: cache.app + cache: + id: cache.app .. code-block:: xml From e9a02689ebdad90dc01fdef22f830600e57559dd Mon Sep 17 00:00:00 2001 From: Tom Parkinson <121138040+tparkinson-ticsystems@users.noreply.github.com> Date: Tue, 30 Sep 2025 11:22:05 -0700 Subject: [PATCH 2/2] Remove trailing whitespace --- security/access_token.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/security/access_token.rst b/security/access_token.rst index 54e355aa4b5..ae6a2420769 100644 --- a/security/access_token.rst +++ b/security/access_token.rst @@ -434,7 +434,7 @@ Next, configure the ``base_uri`` and ``discovery`` options: oidc_user_info: base_uri: https://www.example.com/realms/demo/ discovery: - cache: + cache: id: cache.app .. code-block:: xml @@ -745,7 +745,7 @@ from the OpenID Connect Discovery), and configure the ``discovery`` option: issuers: ['https://oidc.example.com'] discovery: base_uri: https://www.example.com/realms/demo/ - cache: + cache: id: cache.app .. code-block:: xml