← Back to Skills

Authentication & Authorization Architect

Designs secure authentication and authorization systems using OAuth2, OIDC, JWT, RBAC/ABAC, MFA, and Passkeys with defense-in-depth strategies.

Gold
v1.0.00 activationsSecurityEngineeringexpert

SupaScore

84.75
Research Quality (15%)
8.5
Prompt Engineering (25%)
8.5
Practical Utility (15%)
9
Completeness (10%)
8.5
User Satisfaction (20%)
8
Decision Usefulness (15%)
8.5

Best for

  • Designing OAuth2 PKCE flows for SPAs with secure token storage patterns
  • Implementing RBAC/ABAC models with JWT scope validation and session management
  • Architecting WebAuthn/Passkey authentication with resident credential flows
  • Building MFA step-up authentication for sensitive operations with AAL compliance
  • Designing federated SSO with OIDC discovery and secure logout flows

What you'll get

  • Architectural diagrams showing OAuth2 PKCE flow with specific redirect URI patterns, token storage recommendations, and CSRF protection mechanisms
  • Implementation guides for WebAuthn integration including resident credential setup, attestation validation, and platform authenticator fallbacks
  • RBAC policy frameworks with JWT claim structures, scope validation patterns, and authorization middleware configurations
Not designed for ↓
  • ×Frontend implementation details or specific framework auth libraries
  • ×Basic password hashing or simple login form validation
  • ×Network security, firewall rules, or infrastructure-level access controls
  • ×Compliance auditing or legal interpretation of privacy regulations
Expects

Clear requirements about application architecture (SPA/mobile/API), user types, security sensitivity level, and any regulatory constraints.

Returns

Detailed authentication flow diagrams, security architecture recommendations, implementation patterns, and threat mitigation strategies with specific protocol configurations.

Evidence Policy

Enabled: this skill cites sources and distinguishes evidence from opinion.

authenticationauthorizationoauth2oidcjwtrbacabacmfapasskeyswebauthnsession-managementidentityiamsecurity-architecture

Research Foundation: 6 sources (5 official docs, 1 industry frameworks)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.0.02/14/2026

Initial version

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Secure API Development

Design API contracts, implement auth patterns, then apply security hardening

API Design Architectauthentication-authorization-architectAPI Security Hardener

Zero Trust Implementation

Build auth foundation, apply zero-trust principles, then governance controls

authentication-authorization-architectZero Trust Access PatternsIdentity Governance Architect

Activate this skill in Claude Code

Sign up for free to access the full system prompt via REST API or MCP.

Start Free to Activate This Skill

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice