Specifications

Specifications
Progress0/13 (0%)

The IAM world is built on standards. This category covers the key protocols and specs you’ll run into in enterprise identity: OAuth and OIDC for modern auth, SAML for legacy SSO, SCIM for provisioning, WebAuthn for phishing-resistant auth, and emerging protocols like MCP for AI integrations.

01

OAuth 2.0: Roles, Flows, and Tokens

Learn the OAuth actors (client, resource owner, authorization server), the main grants, and how access tokens are actually used.

02

OAuth 2.1 + Best Practices (PKCE, Rotation, and Threat Model)

What OAuth 2.1 changes (and why), plus practical hardening: PKCE, refresh token rotation, and safe redirect URIs.

03

OpenID Connect (OIDC): Identity Layer on OAuth

How OIDC adds authentication and user identity to OAuth: ID tokens, discovery, scopes, and claims.

04

SAML 2.0: Assertions, Trust, and Enterprise SSO

A practical SAML mental model: IdP/SP roles, assertions, signatures, and why SAML is still everywhere.

05

SCIM 2.0: Provisioning, Deprovisioning, and Group Sync

How SCIM models users and groups, what operations matter in production, and why idempotency is critical.

06

WebAuthn, FIDO2, and Passkeys

Phishing-resistant authentication explained: public key credentials, ceremonies, attestation, and deployment realities.

07

JWT + JOSE (JWS/JWE/JWK): The Token Toolbox

What JWTs are (and aren’t), when to sign vs encrypt, key rotation with JWKs, and common validation mistakes.

08

FAPI (Financial-grade API): High-Security OAuth Profiles

OAuth profiles for high assurance: strict redirect rules, signed requests, mutual TLS, and why it matters outside banking.

09

DPoP and Sender-Constrained Tokens

Reduce token replay by binding tokens to a client key (DPoP) or TLS channel, and understand tradeoffs.

10

Model Context Protocol (MCP): Identity for AI Tooling

A practical intro to MCP, how it connects tools to models, and the identity/authorization questions you must answer.

11

OAuth Token Exchange & On-Behalf-Of (OBO) Flows

How services call other services safely using delegated tokens (OBO) and token exchange.

12

Single Logout (SLO): Front-Channel vs Back-Channel

How single logout works, why it’s hard in practice, and how front-channel and back-channel approaches differ.

13

OAuth Token Security: Revocation, Rotation, and Incident Response

Best practices for securing access/refresh tokens and responding when tokens are stolen.