Course info
Dec 16, 2020
2h 35m
Your 10-day individual free trial includes:

Expert-led courses

Keep up with the pace of change with thousands of expert-led, in-depth courses.

Implementing authentication and authorization in PHP are crucial for safeguarding your applications and ensuring proper usage of them. In this course, Authentication and Authorization in PHP, you’ll learn how to implement multiple methods of authentication and authorization using PHP. First, you'll explore how to implement four types of authentication: HTTP, Session, OAuth2, and OIDC. Next, you’ll discover how to implement two types of authorization: Role-based Access Control (RBAC) and Access Control Lists (ACLs). Finally, you'll get a broad introduction to modern privacy legislation and its impacts on the security measures which you implement in your applications. When you’re finished with this course, you’ll have the skills and knowledge needed to implement modern authentication and authorization in your PHP web applications.

About the author
About the author

Matthew Setter is a freelance software developer, with over 10 years development experience, specializing in PHP, Zend Framework, and JavaScript. He's also a freelance technical writer, founder, and editor of Master Zend Framework, which is dedicated to helping developers master Zend Framework.

More from the author
Mezzio: Getting Started
2h 46m
Jul 27, 2020
Zend Expressive Essentials
2h 2m
Apr 27, 2018
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Matthew Setter, and welcome to my course, Authentication and Authorization in PHP. I've been developing web‑based applications since around 1999 and have been developing with PHP since version 3 before it even had object‑oriented support. Now this course provides a solid introduction to implementing authentication and authorization in PHP concepts and techniques that are crucial for safeguarding our applications and ensuring proper usage of them. Some of the major topics that we will cover in this course include HTTP basic and digest authentication, form‑based authentication, access control lists, and role‑based access control. By the end of this course, you'll know how to protect your PHP applications and ensure that users can only access functionality which they've been allowed access to, regardless of how small or large your applications are. I hope you'll join me on this journey of learning how to secure PHP applications with my course, Authentication and Authorization in PHP.