The Definitive Guide to Yii 2.0

The Definitive Guide to Yii 2.0

The Definitive Guide to Yii 2.0

This tutorial is released under the Terms of Yii Documentation.

All Rights Reserved.

2014 (c) Yii Software LLC.



AuthClient Extension for Yii 2
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

AuthClient Extension for Yii 2

This extension adds OpenID, OAuth and OAuth2 consumers for the Yii framework 2.0.

Cryptography Yii 2
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Cryptography

In this section we'll review the following security aspects:

  • Generating random data
  • Encryption and Decryption
  • Confirming Data Integrity

Working with Passwords Yii
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Working with Passwords

Most developers know that passwords cannot be stored in plain text, but many developers believe it's still safe to hash passwords using md5 or sha1. There was a time when using the aforementioned hashing algorithms was sufficient, but modern hardware makes it possible to reverse such hashes and even stronger ones very quickly using brute force attacks.

Authorization in Yii
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Authorization

Authorization is the process of verifying that a user has enough permission to do something. Yii provides two authorization methods: Access Control Filter (ACF) and Role-Based Access Control (RBAC).

Authentication in Yii 2
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Authentication

Authentication is the process of verifying the identity of a user. It usually uses an identifier (e.g. a username or an email address) and a secret token (e.g. a password or an access token) to judge if the user is the one whom he claims as. Authentication is the basis of the login feature.

Yii Security overview
Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive

Security

Good security is vital to the health and success of any application. Unfortunately, many developers cut corners when it comes to security, either due to a lack of understanding or because implementation is too much of a hurdle. To make your Yii powered application as secure as possible, Yii has included several excellent and easy to use security features.

Subcategories