@@ -193,7 +193,7 @@ pattern so that it is only accessible by requests from the local server itself:
193193access_control :
194194#
195195# the 'ips' option supports IP addresses and subnet masks
196- -{ path: ^/internal, roles:IS_AUTHENTICATED_ANONYMOUSLY , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
196+ -{ path: ^/internal, roles:IS_AUTHENTICATED , ips: [127.0.0.1, ::1, 192.168.0.1/24] }
197197 -{ path: ^/internal, roles: ROLE_NO_ACCESS }
198198
199199 ..code-block ::xml
@@ -210,7 +210,7 @@ pattern so that it is only accessible by requests from the local server itself:
210210<!-- ...-->
211211
212212<!-- the 'ips' option supports IP addresses and subnet masks-->
213- <rule path =" ^/internal" role =" IS_AUTHENTICATED_ANONYMOUSLY " >
213+ <rule path =" ^/internal" role =" IS_AUTHENTICATED " >
214214 <ip >127.0.0.1</ip >
215215 <ip >::1</ip >
216216 </rule >
@@ -227,7 +227,7 @@ pattern so that it is only accessible by requests from the local server itself:
227227 'access_control' => [
228228 [
229229 'path' => '^/internal',
230- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
230+ 'role' => 'IS_AUTHENTICATED ',
231231 // the 'ips' option supports IP addresses and subnet masks
232232 'ips' => ['127.0.0.1', '::1'],
233233 ],
@@ -254,8 +254,8 @@ But if the same request comes from ``127.0.0.1`` or ``::1`` (the IPv6 loopback
254254address):
255255
256256* Now, the first access control rule is enabled as both the ``path `` and the
257- ``ip `` match: access is allowed as the user alwayshas the
258- ``IS_AUTHENTICATED_ANONYMOUSLY ``role .
257+ ``ip `` match: access is allowed as the user alwaysmatches the
258+ ``IS_AUTHENTICATED ``attribute .
259259
260260* The second access rule is not examined as the first rule matched.
261261
@@ -342,7 +342,7 @@ access those URLs via a specific port. This could be useful for example for
342342security :
343343# ...
344344access_control :
345- -{ path: ^/cart/checkout, roles:IS_AUTHENTICATED_ANONYMOUSLY , port: 8080 }
345+ -{ path: ^/cart/checkout, roles:IS_AUTHENTICATED , port: 8080 }
346346
347347 ..code-block ::xml
348348
@@ -357,7 +357,7 @@ access those URLs via a specific port. This could be useful for example for
357357 <config >
358358<!-- ...-->
359359 <rule path =" ^/cart/checkout"
360- role =" IS_AUTHENTICATED_ANONYMOUSLY "
360+ role =" IS_AUTHENTICATED "
361361port =" 8080"
362362 />
363363 </config >
@@ -371,7 +371,7 @@ access those URLs via a specific port. This could be useful for example for
371371 'access_control' => [
372372 [
373373 'path' => '^/cart/checkout',
374- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
374+ 'role' => 'IS_AUTHENTICATED ',
375375 'port' => '8080',
376376 ],
377377 ],
@@ -393,7 +393,7 @@ the user will be redirected to ``https``:
393393security :
394394# ...
395395access_control :
396- -{ path: ^/cart/checkout, roles:IS_AUTHENTICATED_ANONYMOUSLY , requires_channel: https }
396+ -{ path: ^/cart/checkout, roles:IS_AUTHENTICATED , requires_channel: https }
397397
398398 ..code-block ::xml
399399
@@ -408,7 +408,7 @@ the user will be redirected to ``https``:
408408 <config >
409409<!-- ...-->
410410 <rule path =" ^/cart/checkout"
411- role =" IS_AUTHENTICATED_ANONYMOUSLY "
411+ role =" IS_AUTHENTICATED "
412412requires-channel =" https"
413413 />
414414 </config >
@@ -422,7 +422,7 @@ the user will be redirected to ``https``:
422422 'access_control' => [
423423 [
424424 'path' => '^/cart/checkout',
425- 'role' => 'IS_AUTHENTICATED_ANONYMOUSLY ',
425+ 'role' => 'IS_AUTHENTICATED ',
426426 'requires_channel' => 'https',
427427 ],
428428 ],