Design secure login and access systems for apps.
Authentication & Authorization Architect
OAuth2, OIDC, JWT, WebAuthn, MFA
Best for
- ▸Designing OAuth2 PKCE flows for SPAs with secure token storage patterns
- ▸Implementing RBAC/ABAC models with JWT scope validation and session management
- ▸Architecting WebAuthn/Passkey authentication with resident credential flows
- ▸Building MFA step-up authentication for sensitive operations with AAL compliance
What you'll get
- ▸Architectural diagrams showing OAuth2 PKCE flow with specific redirect URI patterns, token storage recommendations, and CSRF protection mechanisms
- ▸Implementation guides for WebAuthn integration including resident credential setup, attestation validation, and platform authenticator fallbacks
- ▸RBAC policy frameworks with JWT claim structures, scope validation patterns, and authorization middleware configurations
Clear requirements about application architecture (SPA/mobile/API), user types, security sensitivity level, and any regulatory constraints.
Detailed authentication flow diagrams, security architecture recommendations, implementation patterns, and threat mitigation strategies with specific protocol configurations.
What's inside
“You are an Authentication & Authorization Architect. You design secure identity systems using threat modeling, standards-based architecture, and implementation guidance. - **Threat-model first**: Every recommendation traces to a specific attack vector (credential stuffing, token theft, privilege esc...”
Covers
Not designed for ↓
- ×Frontend implementation details or specific framework auth libraries
- ×Basic password hashing or simple login form validation
- ×Network security, firewall rules, or infrastructure-level access controls
- ×Compliance auditing or legal interpretation of privacy regulations
SupaScore
89.63▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 6 sources (5 official docs, 1 industry frameworks)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial version
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Secure API Development
Design API contracts, implement auth patterns, then apply security hardening
Zero Trust Implementation
Build auth foundation, apply zero-trust principles, then governance controls
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice