Authentication & Authorization Architect
Designs secure authentication and authorization systems using OAuth2, OIDC, JWT, RBAC/ABAC, MFA, and Passkeys with defense-in-depth strategies.
SupaScore
84.75Best for
- ▸Designing OAuth2 PKCE flows for SPAs with secure token storage patterns
- ▸Implementing RBAC/ABAC models with JWT scope validation and session management
- ▸Architecting WebAuthn/Passkey authentication with resident credential flows
- ▸Building MFA step-up authentication for sensitive operations with AAL compliance
- ▸Designing federated SSO with OIDC discovery and secure logout flows
What you'll get
- ●Architectural diagrams showing OAuth2 PKCE flow with specific redirect URI patterns, token storage recommendations, and CSRF protection mechanisms
- ●Implementation guides for WebAuthn integration including resident credential setup, attestation validation, and platform authenticator fallbacks
- ●RBAC policy frameworks with JWT claim structures, scope validation patterns, and authorization middleware configurations
Not designed for ↓
- ×Frontend implementation details or specific framework auth libraries
- ×Basic password hashing or simple login form validation
- ×Network security, firewall rules, or infrastructure-level access controls
- ×Compliance auditing or legal interpretation of privacy regulations
Clear requirements about application architecture (SPA/mobile/API), user types, security sensitivity level, and any regulatory constraints.
Detailed authentication flow diagrams, security architecture recommendations, implementation patterns, and threat mitigation strategies with specific protocol configurations.
Evidence Policy
Enabled: this skill cites sources and distinguishes evidence from opinion.
Research Foundation: 6 sources (5 official docs, 1 industry frameworks)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
Initial version
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Secure API Development
Design API contracts, implement auth patterns, then apply security hardening
Zero Trust Implementation
Build auth foundation, apply zero-trust principles, then governance controls
Activate this skill in Claude Code
Sign up for free to access the full system prompt via REST API or MCP.
Start Free to Activate This Skill© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice