O'Reilly logo

Mastering Yii by Charles R. Portwood II

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we covered the basics of authenticating the identity of our users and granting them access to certain pages based upon attributes we set in the user identity interface, and how to implement Yii2's hierarchical role-based authentication. We also explored how to use flash messages to enhance our user experience. Additionally, we explored a few components of the security component, which enabled us to hash the user's passwords, hash and verify data, and encrypt and decrypt information utilizing the user's password.

In the next chapter, we'll cover more complex routing within our application, how to work with and modify our responses directly with Yii2, and the basics of listening and responding to events.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required