PHPackages                             triforce-technologies/symfony-rbac-bundle - PHPackages - PHPackages  [Skip to content](#main-content)[PHPackages](/)[Directory](/)[Categories](/categories)[Trending](/trending)[Leaderboard](/leaderboard)[Changelog](/changelog)[Analyze](/analyze)[Collections](/collections)[Log in](/login)[Sign up](/register)

1. [Directory](/)
2. /
3. [Authentication &amp; Authorization](/categories/authentication)
4. /
5. triforce-technologies/symfony-rbac-bundle

ActiveSymfony-bundle[Authentication &amp; Authorization](/categories/authentication)

triforce-technologies/symfony-rbac-bundle
=========================================

Symfony Bundle allow to use RBAC control access for symfony project

0.9.22(3y ago)019MITPHPPHP &gt;=8.2.1

Since Apr 7Pushed 3y agoCompare

[ Source](https://github.com/triforce-technologies/symfony-rbac-bundle)[ Packagist](https://packagist.org/packages/triforce-technologies/symfony-rbac-bundle)[ RSS](/packages/triforce-technologies-symfony-rbac-bundle/feed)WikiDiscussions main Synced 1mo ago

READMEChangelog (10)Dependencies (6)Versions (23)Used By (0)

Triforce\\RBACBundle
====================

[](#triforcerbacbundle)

Triforce\\RBACBundle is symfony 6 bundle with full access control library for PHP. It provides NIST Level 2 Standard Hierarchical Role Based Access Control as an easy to use library to PHP developers. It's a rework of the phprbac.net library made by OWASP for symfony 6.

Table of Content
----------------

[](#table-of-content)

- [How it works ?](#how-it-works)
- [Installation](#installation)
- [Configuration](#configuration)
    - [Prepare Symfony](#prepare-symfony)
    - [Add PhpRbac configuration](#add-phprbac-configuration)
    - [Roles and permissions creation](#roles-and-permissions-creation)
    - [Make the rbac relations](#make-the-rbac-relations)
    - [Assign Role to the user and check permission](#assign-role-to-the-user-and-check-permission)
- [RBAC for controller](#rbac-for-controller)
- [Voter based RBAC](#voter-based-rbac)
- [Symfony CLI commands](#symfony-cli-commands)
- [Twig functions](#twig)

How it works ?
--------------

[](#how-it-works-)

Go to  :) to have the representation of permissions and roles as well as their interactions.

[![Roles and Permissions](https://camo.githubusercontent.com/ed588afa9b72c409264b2e022943fc0e1488e87e945e2205238a19b53dbcbc4a/68747470733a2f2f706870726261632e6e65742f696d672f726261632e706e67)](https://camo.githubusercontent.com/ed588afa9b72c409264b2e022943fc0e1488e87e945e2205238a19b53dbcbc4a/68747470733a2f2f706870726261632e6e65742f696d672f726261632e706e67)

A hierarchical RBAC model of a system Blue: roles, Gray: users, Yellow: permissions Installation
------------

[](#installation)

just include the package with composer:

```
composer require olivier127/rbac-bundle
```

register the bundle inside config/bundles.php

```
return [
    ...
    Triforce\RBACBundle\Triforce\RBACBundle::class => ['all' => true],
];
```

Add the Triforce\\RBACBundle\\Entity\\UserRoleTrait inside the User entity class to add the rbac role relation.

Update the database schema with doctrine migration or doctrine schema update to create all the tables

Configuration
-------------

[](#configuration)

### Prepare Symfony

[](#prepare-symfony)

Specify the different sections requiring prior authentication in the firewall security configuration section.

Access control only applies to authenticated sections of the website. Therefore, we will use basic ROLE\_USER for all users. ROLE\_ADMIN can be used for the main administrator but his rights will only be allocated by being associated with the role '/' of the roles tree.

example :

```
# config/packages/security.yaml
security:
    # ...

    role_hierarchy:
        ROLE_ADMIN: ROLE_USER

    access_control:
        - { path: ^/backend, roles: ROLE_USER }
        - { path: ^/todolist, roles: ROLE_USER }
```

### Add PhpRbac configuration

[](#add-phprbac-configuration)

You must create your own entities for driving permissions and roles.

example :

```
/* src/Entity/Role.php */
namespace App\Entity;

use Doctrine\ORM\Mapping as ORM;
use Triforce\RBACBundle\Entity\Role as EntityRole;
use Triforce\RBACBundle\Repository\RoleRepository;

#[ORM\Entity(repositoryClass: RoleRepository::class)]
#[ORM\Table('my_roles')]
class Role extends EntityRole
{

}
```

```
/* src/Entity/Permission.php */
namespace App\Entity;

use Doctrine\ORM\Mapping as ORM;
use Triforce\RBACBundle\Entity\Permission as EntityPermission;
use Triforce\RBACBundle\Repository\PermissionRepository;

#[ORM\Entity(repositoryClass: PermissionRepository::class)]
#[ORM\Table('my_permissions')]
class Permission extends EntityPermission
{

}
```

add triforce\_rbac.yaml to associate theses entities to the rbac core

```
# config/packages/triforce_rbac.yaml
triforce_rbac:
  no_authentication_section:
    default: deny
  resolve_target_entities:
    role: App\Entity\Role
    permission: App\Entity\Permission
```

### Roles and permissions creation

[](#roles-and-permissions-creation)

Add all the roles and the permissions you need with the RoleManager and the PermissionManager

examples :

to add a permission to the root

```
/** @var Triforce\RBACBundle\Core\PermissionManager $manager */
$manager = $this->container->get(PermissionManager::class);
$permission = $manager->add("notepad", "Notepad", PermissionManager::ROOT_ID);
```

To add a chain or permission

```
/** @var Triforce\RBACBundle\Core\PermissionManager $manager */
$manager = $this->container->get(PermissionManager::class);
$manager->addPath("/notepad/todolist/read", ['notepad' => 'Notepad', 'todolist' => "Todo list", "read" => "Read Access"]);
```

Make the rbac relations
-----------------------

[](#make-the-rbac-relations)

Adding roles use same methods

for the example, i use the chain role "/editor/reviewer". The reviewer is the subrole of the editor, the editor is the subrole of the root "/".

```
/** @var Triforce\RBACBundle\Core\RoleManager $manager */
$manager = $this->container->get(RoleManager::class);
$manager->addPath("/editor/reviewer", ['editor' => 'Editor', 'reviewer' => "Reviewer"]);
```

Assign permissions to roles

```
/** @var Triforce\RBACBundle\Core\RoleManager $manager */
$manager = $this->container->get(RoleManager::class);
$editorId = $manager->getPathId("/editor");
$editor = $manager->getNode($editorId);
$reviewerId = $manager->getPathId("/editor/reviewer");
$reviewer = $manager->getNode($reviewerId);

$manager->assignPermission($editor, "/notepad");
$manager->assignPermission($reviewer, "/notepad/todolist/read");
$manager->assignPermission($reviewer, "/notepad/todolist/write");
```

The editor role will have /notepad permission and all sub permissions while the reviewer role will only have `/notepad/todolist/read` and `/notepad/todolist/write` permissions

### Assign Role to the user and check permission

[](#assign-role-to-the-user-and-check-permission)

If the `UserRoleTrait` is in the class `User`, you will have `addRbacRole`. Just add the role in this entity

```
/** @var Triforce\RBACBundle\Core\RoleManager $manager */
$manager = $this->container->get(RoleManager::class);
$editorId = $manager->getPathId("/editor");
$editor = $manager->getNode($editorId);

$user = $userRepository->find($userId);
$user->addRbacRole($user);
$userRepository->add($user, true);
```

To test a user's permission or role, use the Triforce\\RBACBundle\\Core\\Rbac class.

```
$rbacCtrl = $this->container->get(Rbac::class);
$rbacCtrl->hasPermission('/notepad', $userId);
$rbacCtrl->hasRole('/editor/reviewer', $userId);
```

RBAC for controller
-------------------

[](#rbac-for-controller)

Just add attribute is granted like this example. The attributes `IsGranted` and `HasRole` check the security with the current user.

```
namespace App\Controller;

...
use Triforce\RBACBundle\Attribute\AccessControl as RBAC;

#[Route('/todolist')]
#[RBAC\IsGranted('/notepad/todolist/read')]
class TodolistController extends AbstractController
{
    #[RBAC\IsGranted('/notepad/todolist/read')]
    #[Route('/', name: 'app_todolist_index', methods: ['GET'])]
    public function index(TodolistRepository $todolistRepository): Response
    {
        ...
    }

    #[RBAC\IsGranted('/notepad/todolist/write')]
    #[Route('/new', name: 'app_todolist_new', methods: ['GET', 'POST'])]
    public function new(Request $request, TodolistRepository $todolistRepository): Response
    {
        ...
    }

    #[RBAC\IsGranted('/notepad/todolist/read')]
    #[Route('/{id}', name: 'app_todolist_show', methods: ['GET'])]
    public function show(Todolist $todolist): Response
    {
        ...
    }

    #[RBAC\IsGranted('/notepad/todolist/write')]
    #[Route('/{id}/edit', name: 'app_todolist_edit', methods: ['GET', 'POST'])]
    public function edit(Request $request, Todolist $todolist, TodolistRepository $todolistRepository): Response
    {
        ...
    }

    #[RBAC\IsGranted('/notepad/todolist')]
    #[Route('/{id}', name: 'app_todolist_delete', methods: ['POST'])]
    public function delete(Request $request, Todolist $todolist, TodolistRepository $todolistRepository): Response
    {
        ...
    }
}
```

the first RBAC\\IsGranted on the class check the lowest permission to access to the controller with the current user. The `RBAC\IsGranted` on each action check the minimum permission to make action work.

In the example :

- The permission `/notepad/todolist/read` gives the access to the all controller and so index and show action.
- The permission `/notepad/todolist/write` gives the access to edit the todolist
- The permission `/notepad/todolist` parent to the read and write permission gives the access to delete

The permission `/notepad/todolist` has also the read and write permission.

Voter based Rbac
----------------

[](#voter-based-rbac)

With RbacVoter, you can use symfony security to check the user rbac permissions (not the roles).

example:

```
    #[IsGranted('/todolist/index', statusCode: 403, message: 'Access denied for user')]
    #[Route('/', name: 'app_todo_list_index', methods: ['GET'])]
    public function index(TodoListRepository $todoListRepository): Response
```

You need to set the security access control to be unanimous (all the voter must be ok)

add this lines to `config/packages/security.yaml`

```
security:
    ...
    access_decision_manager:
        strategy: unanimous
        allow_if_all_abstain: false
```

Symfony CLI commands
--------------------

[](#symfony-cli-commands)

The install command sets the root node role and permission and associates them.

```
  security:rbac:install
```

Add permission into the rbac permissions tree

```
security:rbac:permission:add
```

Add permission into the rbac roles tree

```
security:rbac:role:add
```

Assign a permission to a role

```
security:rbac:role:assign-permission
```

Assign a role to a user

```
security:rbac:user:assign-role
```

Theses commandes are interactives.

Twig
----

[](#twig)

test if user has a role

```
{% if hasRole('/the/role') %}
...
{% endif %}
```

test if user has a permission

```
{% if hasPermission('/the/permission') %}
...
{% endif %}
```

###  Health Score

25

—

LowBetter than 37% of packages

Maintenance20

Infrequent updates — may be unmaintained

Popularity6

Limited adoption so far

Community9

Small or concentrated contributor base

Maturity57

Maturing project, gaining track record

 Bus Factor1

Top contributor holds 54.8% of commits — single point of failure

How is this calculated?**Maintenance (25%)** — Last commit recency, latest release date, and issue-to-star ratio. Uses a 2-year decay window.

**Popularity (30%)** — Total and monthly downloads, GitHub stars, and forks. Logarithmic scaling prevents top-heavy scores.

**Community (15%)** — Contributors, dependents, forks, watchers, and maintainers. Measures real ecosystem engagement.

**Maturity (30%)** — Project age, version count, PHP version support, and release stability.

###  Release Activity

Cadence

Every ~0 days

Total

21

Last Release

1131d ago

### Community

Maintainers

![](https://www.gravatar.com/avatar/9997df340a580706616092f0a131e26c7c20145a60c5f47e5a28a024be766613?d=identicon)[faridanthony](/maintainers/faridanthony)

---

Top Contributors

[![faridanthony](https://avatars.githubusercontent.com/u/6576473?v=4)](https://github.com/faridanthony "faridanthony (23 commits)")[![Olivier127](https://avatars.githubusercontent.com/u/70262207?v=4)](https://github.com/Olivier127 "Olivier127 (18 commits)")[![bazo](https://avatars.githubusercontent.com/u/181588?v=4)](https://github.com/bazo "bazo (1 commits)")

---

Tags

symfonybundlesecurityrbacowaspaccess-controlrolephprbac.net

### Embed Badge

![Health badge](/badges/triforce-technologies-symfony-rbac-bundle/health.svg)

```
[![Health](https://phpackages.com/badges/triforce-technologies-symfony-rbac-bundle/health.svg)](https://phpackages.com/packages/triforce-technologies-symfony-rbac-bundle)
```

###  Alternatives

[olivier127/rbac-bundle

Symfony PhpRabcBundle allow to use RBAC control access for symfony project

318.3k](/packages/olivier127-rbac-bundle)[sulu/sulu

Core framework that implements the functionality of the Sulu content management system

1.3k1.3M152](/packages/sulu-sulu)[ahmed-bhs/doctrine-doctor

Runtime analysis tool for Doctrine ORM integrated into Symfony Web Profiler. Unlike static linters, it analyzes actual query execution at runtime to detect performance bottlenecks, security vulnerabilities, and best practice violations during development with real execution context and data.

813.1k](/packages/ahmed-bhs-doctrine-doctor)

PHPackages © 2026

[Directory](/)[Categories](/categories)[Trending](/trending)[Changelog](/changelog)[Analyze](/analyze)
