How to Impersonate a User

How to Impersonate a User

Sometimes, it’s useful to be able to switch from one user to another without having to log out and log in again (for instance when you are debugging something a user sees that you can’t reproduce).

Caution

User impersonation is not compatible with some authentication mechanisms (e.g. REMOTE_USER) where the authentication information is expected to be sent on each request.

Impersonating the user can be done by activating the switch_user firewall listener:

  • YAML

    1. # config/packages/security.yaml
    2. security:
    3. # ...
    4. firewalls:
    5. main:
    6. # ...
    7. switch_user: true
  • XML

    1. <!-- config/packages/security.xml -->
    2. <?xml version="1.0" encoding="UTF-8" ?>
    3. <srv:container xmlns="http://symfony.com/schema/dic/security"
    4. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    5. xmlns:srv="http://symfony.com/schema/dic/services"
    6. xsi:schemaLocation="http://symfony.com/schema/dic/services
    7. https://symfony.com/schema/dic/services/services-1.0.xsd">
    8. <config>
    9. <!-- ... -->
    10. <firewall name="main">
    11. <!-- ... -->
    12. <switch-user/>
    13. </firewall>
    14. </config>
    15. </srv:container>
  • PHP

    1. // config/packages/security.php
    2. $container->loadFromExtension('security', [
    3. // ...
    4. 'firewalls' => [
    5. 'main'=> [
    6. // ...
    7. 'switch_user' => true,
    8. ],
    9. ],
    10. ]);

To switch to another user, add a query string with the _switch_user parameter and the username (or whatever field our user provider uses to load users) as the value to the current URL:

  1. http://example.com/somewhere?_switch_user=thomas

Tip

Instead of adding a _switch_user query string parameter, you can pass the username in a HTTP_X_SWITCH_USER header.

To switch back to the original user, use the special _exit username:

  1. http://example.com/somewhere?_switch_user=_exit

This feature is only available to users with a special role called ROLE_ALLOWED_TO_SWITCH. Using role_hierarchy is a great way to give this role to the users that need it.

Knowing When Impersonation Is Active

When a user is being impersonated, Symfony grants them a special role called ROLE_PREVIOUS_ADMIN (in addition to the roles the user may have). Use this special role, for instance, to show a link to exit impersonation in a template:

  1. {% if is_granted('ROLE_PREVIOUS_ADMIN') %}
  2. <a href="{{ path('homepage', {'_switch_user': '_exit'}) }}">Exit impersonation</a>
  3. {% endif %}

Finding the Original User

New in version 4.3: The SwitchUserToken class was introduced in Symfony 4.3.

In some cases, you may need to get the object that represents the impersonator user rather than the impersonated user. When a user is impersonated the token stored in the token storage will be a SwitchUserToken instance. Use the following snippet to obtain the original token which gives you access to the impersonator user:

  1. // src/Service/SomeService.php
  2. namespace App\Service;
  3. use Symfony\Component\Security\Core\Authentication\Token\SwitchUserToken;
  4. use Symfony\Component\Security\Core\Security;
  5. // ...
  6. class SomeService
  7. {
  8. private $security;
  9. public function __construct(Security $security)
  10. {
  11. $this->security = $security;
  12. }
  13. public function someMethod()
  14. {
  15. // ...
  16. $token = $this->security->getToken();
  17. if ($token instanceof SwitchUserToken) {
  18. $impersonatorUser = $token->getOriginalToken()->getUser();
  19. }
  20. // ...
  21. }
  22. }

Controlling the Query Parameter

This feature needs to be available only to a restricted group of users. By default, access is restricted to users having the ROLE_ALLOWED_TO_SWITCH role. The name of this role can be modified via the role setting. You can also adjust the query parameter name via the parameter setting:

  • YAML

    1. # config/packages/security.yaml
    2. security:
    3. # ...
    4. firewalls:
    5. main:
    6. # ...
    7. switch_user: { role: ROLE_ADMIN, parameter: _want_to_be_this_user }
  • XML

    1. <!-- config/packages/security.xml -->
    2. <?xml version="1.0" encoding="UTF-8" ?>
    3. <srv:container xmlns="http://symfony.com/schema/dic/security"
    4. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    5. xmlns:srv="http://symfony.com/schema/dic/services"
    6. xsi:schemaLocation="http://symfony.com/schema/dic/services
    7. https://symfony.com/schema/dic/services/services-1.0.xsd">
    8. <config>
    9. <!-- ... -->
    10. <firewall name="main">
    11. <!-- ... -->
    12. <switch-user role="ROLE_ADMIN" parameter="_want_to_be_this_user"/>
    13. </firewall>
    14. </config>
    15. </srv:container>
  • PHP

    1. // config/packages/security.php
    2. $container->loadFromExtension('security', [
    3. // ...
    4. 'firewalls' => [
    5. 'main'=> [
    6. // ...
    7. 'switch_user' => [
    8. 'role' => 'ROLE_ADMIN',
    9. 'parameter' => '_want_to_be_this_user',
    10. ],
    11. ],
    12. ],
    13. ]);

Limiting User Switching

If you need more control over user switching, you can use a security voter. First, configure switch_user to check for some new, custom attribute. This can be anything, but cannot start with ROLE_ (to enforce that only your voter will be called):

  • YAML

    1. # config/packages/security.yaml
    2. security:
    3. # ...
    4. firewalls:
    5. main:
    6. # ...
    7. switch_user: { role: CAN_SWITCH_USER }
  • XML

    1. <!-- config/packages/security.xml -->
    2. <?xml version="1.0" encoding="UTF-8" ?>
    3. <srv:container xmlns="http://symfony.com/schema/dic/security"
    4. xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    5. xmlns:srv="http://symfony.com/schema/dic/services"
    6. xsi:schemaLocation="http://symfony.com/schema/dic/services
    7. https://symfony.com/schema/dic/services/services-1.0.xsd">
    8. <config>
    9. <!-- ... -->
    10. <firewall name="main">
    11. <!-- ... -->
    12. <switch-user role="CAN_SWITCH_USER"/>
    13. </firewall>
    14. </config>
    15. </srv:container>
  • PHP

    1. // config/packages/security.php
    2. $container->loadFromExtension('security', [
    3. // ...
    4. 'firewalls' => [
    5. 'main'=> [
    6. // ...
    7. 'switch_user' => [
    8. 'role' => 'CAN_SWITCH_USER',
    9. ],
    10. ],
    11. ],
    12. ]);

Then, create a voter class that responds to this role and includes whatever custom logic you want:

  1. // src/Security/Voter/SwitchToCustomerVoter.php
  2. namespace App\Security\Voter;
  3. use Symfony\Component\Security\Core\Authentication\Token\TokenInterface;
  4. use Symfony\Component\Security\Core\Authorization\Voter\Voter;
  5. use Symfony\Component\Security\Core\Security;
  6. use Symfony\Component\Security\Core\User\UserInterface;
  7. class SwitchToCustomerVoter extends Voter
  8. {
  9. private $security;
  10. public function __construct(Security $security)
  11. {
  12. $this->security = $security;
  13. }
  14. protected function supports($attribute, $subject): bool
  15. {
  16. return in_array($attribute, ['CAN_SWITCH_USER'])
  17. && $subject instanceof UserInterface;
  18. }
  19. protected function voteOnAttribute($attribute, $subject, TokenInterface $token): bool
  20. {
  21. $user = $token->getUser();
  22. // if the user is anonymous or if the subject is not a user, do not grant access
  23. if (!$user instanceof UserInterface || !$subject instanceof UserInterface) {
  24. return false;
  25. }
  26. // you can still check for ROLE_ALLOWED_TO_SWITCH
  27. if ($this->security->isGranted('ROLE_ALLOWED_TO_SWITCH')) {
  28. return true;
  29. }
  30. // check for any roles you want
  31. if ($this->security->isGranted('ROLE_TECH_SUPPORT')) {
  32. return true;
  33. }
  34. /*
  35. * or use some custom data from your User object
  36. if ($user->isAllowedToSwitch()) {
  37. return true;
  38. }
  39. */
  40. return false;
  41. }
  42. }

That’s it! When switching users, your voter now has full control over whether or not this is allowed. If your voter isn’t called, see Configuring the Voter.

Events

The firewall dispatches the security.switch_user event right after the impersonation is completed. The Symfony\Component\Security\Http\Event\SwitchUserEvent is passed to the listener, and you can use this to get the user that you are now impersonating.

The Making the Locale “Sticky” during a User’s Session article does not update the locale when you impersonate a user. If you do want to be sure to update the locale when you switch users, add an event subscriber on this event:

  1. // src/EventListener/SwitchUserSubscriber.php
  2. namespace App\EventListener;
  3. use Symfony\Component\EventDispatcher\EventSubscriberInterface;
  4. use Symfony\Component\Security\Http\Event\SwitchUserEvent;
  5. use Symfony\Component\Security\Http\SecurityEvents;
  6. class SwitchUserSubscriber implements EventSubscriberInterface
  7. {
  8. public function onSwitchUser(SwitchUserEvent $event): void
  9. {
  10. $request = $event->getRequest();
  11. if ($request->hasSession() && ($session = $request->getSession())) {
  12. $session->set(
  13. '_locale',
  14. // assuming your User has some getLocale() method
  15. $event->getTargetUser()->getLocale()
  16. );
  17. }
  18. }
  19. public static function getSubscribedEvents(): array
  20. {
  21. return [
  22. // constant for security.switch_user
  23. SecurityEvents::SWITCH_USER => 'onSwitchUser',
  24. ];
  25. }
  26. }

That’s it! If you’re using the default services.yaml configuration, Symfony will automatically discover your service and call onSwitchUser whenever a switch user occurs.

For more details about event subscribers, see Events and Event Listeners.

This work, including the code samples, is licensed under a Creative Commons BY-SA 3.0 license.