Recommend this page to a friend! |
Classes of Duong Huynh Nghia | PHP Slim Framework 3 Modular Application | libraries/vendor/zendframework/zend-permissions-acl/doc/book/advanced.md | Download |
|
![]() Advanced UsageStoring ACL Data for Persistencezend-permissions-acl was designed in such a way that it does not require any
particular backend technology such as a database or cache server for storage of the ACL data. Its
complete PHP implementation enables customized administration tools to be built upon
Storage of ACL data is therefore left as a task for the developer, since use cases are expected to
vary widely for various situations. Because Writing Conditional ACL Rules with AssertionsSometimes a rule for allowing or denying a role access to a resource should not
be absolute, but dependent upon various criteria. For example, suppose that
certain access should be allowed, but only between the hours of 8:00am and
5:00pm. Another example would be denying access because a request comes from an
IP address that has been flagged as a source of abuse.
Once an assertion class is available, the developer must supply an instance of
the assertion class when assigning conditional rules. A rule that is created
with an assertion only applies when the assertion method returns
The above code creates a conditional allow rule that allows access to all privileges on everything by everyone, except when the requesting IP is "blacklisted". If a request comes in from an IP that is not considered "clean", then the allow rule does not apply. Since the rule applies to all roles, all resources, and all privileges, an "unclean" IP would result in a denial of access. This is a special case, however, and it should be understood that in all other cases (i.e., where a specific role, resource, or privilege is specified for the rule), a failed assertion results in the rule not applying, and other rules would be used to determine whether access is allowed or denied. The |