Description
In the security component, in the first section, called Authentication. the first paragraph says:
When a request points to a secured area, and one of the listeners from the firewall map is able to extract the user's credentials from the current Request object, it should create a token, containing these credentials. The next thing the listener should do is ask the authentication manager to validate the given token, and return an authenticated token if the supplied credentials were found to be valid. The listener should then store the authenticated token using the token storage:
In the point of view from a user that is starting to use this component, this documentation strategy is very frustating
What is a firewall map? (I know it's explained futhermore). Why is has to be able to get the users' credentials from the Request? This means you could be already authenticated or you just submit an login form? What is a Token? Why I need a token with credentials? How long does this token is being valid? What is a TokenStorage? What is his purpose?
I miss very much the following sections:
- Key concepts
- Flow diagrams
- Class diagrams
- Public Api (interfaces) and default implementations