Skill Profile

JWT / OAuth2 / OIDC

JWT tokens, OAuth2 flows, OpenID Connect, Keycloak, Auth0

Security Authentication & Authorization

Roles

30

where this skill appears

Levels

5

structured growth path

Mandatory requirements

67

the other 83 optional

Domain

Security

Group

Authentication & Authorization

Last updated

3/17/2026

How to Use

Choose your current level and compare expectations. The items below show what to cover to advance to the next level.

What is Expected at Each Level

The table shows how skill depth grows from Junior to Principal. Click a row to see details.

Role Required Description
Android Developer Understands JWT/OAuth2 basics for Android: token storage in EncryptedSharedPreferences, OAuth2 authorization code flow with PKCE, and refresh token handling. Implements login/logout flows using AppAuth or custom OAuth2 clients. Follows team guidelines on secure token management.
Application Security Engineer Required Understands basic JWT / OAuth2 / OIDC concepts. Follows security guidelines. Recognizes typical code vulnerabilities.
Backend Developer (C#/.NET) Understands JWT and OAuth2. Configures ASP.NET Core Authentication: AddJwtBearer, [Authorize] with policies. Works with Identity Server/Auth0/Azure AD as IdP.
Backend Developer (Elixir) Implements basic JWT authentication in Phoenix through Guardian. Generates and verifies tokens, configures Guardian.Plug.Pipeline for route protection. Understands JWT structure (header, payload, signature) and authorization flow through Bearer tokens in API requests.
Backend Developer (Go) Uses JWT authentication in Go services: token validation via golang-jwt/jwt, extracting claims in middleware. Understands the OAuth 2.0 flow, integrates Go service with an external identity provider via golang.org/x/oauth2 for basic authorization.
Backend Developer (Java/Kotlin) Understands JWT structure and OAuth2 flow. Configures Spring Security OAuth2 Resource Server for JWT validation. Extracts claims for authorization. Works with Keycloak/Auth0 as Identity Provider.
Backend Developer (Node.js) Implements auth via JWT: token creation and verification (jsonwebtoken), passport.js strategies. Understands access/refresh token flow. Stores secrets in env vars.
Backend Developer (PHP) Understands JWT structure: header, payload, signature. Implements login/logout with JWT tokens. Configures middleware for token validation. Knows the difference between authentication and authorization.
Backend Developer (Python) Required Understands JWT: header, payload, signature. Uses JWT for authentication. Knows OAuth2 flows at a basic level. Stores tokens securely.
Backend Developer (Rust) Implements basic JWT authentication in Rust services through jsonwebtoken crate: token validation, claims extraction through serde deserialization. Configures middleware for Authorization header verification in Axum/Actix-web and understands JWT structure.
Backend Developer (Scala) Understands basic JWT and OAuth 2.0 concepts in Scala application context: JWT token structure, Bearer authentication in Akka HTTP/Play. Uses ready-made libraries for token validation, can extract claims and pass auth context through service requests.
Data Engineer Understands auth for data: API authentication for data sources, service accounts. Manages credentials for pipeline connections.
Desktop Developer (.NET WPF/WinUI/MAUI) Studies JWT token and OAuth 2.0 basics for .NET desktop application user authentication. Understands PKCE authorization flow, secure token storage and basic identity principles in desktop clients.
DevOps Engineer Understands JWT/OAuth for DevOps: configures auth in CI/CD pipelines, service account tokens. Manages credentials for deployment.
DevSecOps Engineer Required Studies JWT basics: token structure (header, payload, signature), signing algorithms (HS256, RS256). Configures OAuth 2.0 Authorization Code flow for web application. Understands difference between access token and refresh token. Uses jwt.io for token debugging and validation.
Flutter Developer Understands basic JWT/OAuth2 concepts for Flutter apps: secure token storage per platform (Keychain/Keystore), OAuth2 authorization code flow with PKCE, and handling expired tokens in HTTP interceptors. Recognizes common authentication vulnerabilities in mobile apps.
Fullstack Developer Implements basic JWT authentication in fullstack applications: login through form, token storage, sending in API request headers. Understands JWT structure, difference between access and refresh tokens, implements route protection on frontend and backend.
iOS Developer Understands JWT/OAuth2 basics for iOS: token storage in Keychain, OAuth2 authorization code flow with PKCE using ASWebAuthenticationSession, and refresh token lifecycle. Implements sign-in flows with Apple's authentication frameworks. Follows team guidelines on secure credential management.
ML Engineer Understands JWT/OAuth2 basics for ML services: API authentication for model endpoints, service-to-service token exchange for training pipelines, and OAuth2 scopes for data access control. Follows team practices for securing model serving APIs and experiment tracking services.
MLOps Engineer Understands JWT/OAuth2 basics for MLOps infrastructure: API gateway authentication for model registries, service account tokens for CI/CD pipelines, and OAuth2 integration with cloud ML platforms. Follows team practices for securing MLOps toolchain access.
Penetration Testing Engineer Required Understands JWT/OAuth2 concepts from a security testing perspective: common JWT vulnerabilities (none algorithm, key confusion), OAuth2 redirect URI manipulation, and token leakage vectors. Recognizes insecure token storage and transmission patterns. Follows team guidelines for authentication security assessments.
Performance Testing Engineer Understands JWT/OAuth2 basics for load testing: generating valid tokens for test scenarios, simulating authenticated user sessions at scale, and measuring authentication endpoint performance. Follows team practices for test environment token management and OAuth2 flow testing.
QA Automation Engineer Understands JWT/OAuth2 basics for test automation: generating test tokens for API testing, handling authentication in E2E test flows, and validating token expiration scenarios. Follows team practices for managing test user credentials and OAuth2 mock configurations.
QA Security Engineer Tests JWT/OAuth: verifies token validation (signature, expiration), scope enforcement, redirect URI validation. Uses jwt.io for token analysis.
React Native Developer Understands basic authorization flow in React Native — storing access/refresh tokens, sending Authorization header. Implements login/logout with JWT. Handles 401 errors and redirects to the auth screen. Stores tokens in secure storage instead of AsyncStorage for security.
Security Analyst Required Understands basic JWT / OAuth2 / OIDC concepts. Follows security guidelines. Recognizes common code vulnerabilities.
Site Reliability Engineer (SRE) Understands JWT/OAuth for SRE: monitors auth services, configures alerting on auth failures. Manages service account tokens for automation.
Solutions Architect Understands JWT/OAuth in architecture: authentication flows, token-based security. Evaluates auth requirements for the system.
Technical Lead Understands JWT and OAuth: token structure, authentication flow, scopes. Integrates OAuth2 providers and works with JWT verification.
Telecom Developer Understands JWT/OAuth2 basics for telecom systems: SIP/IMS authentication token integration, OAuth2 for network API access (CAMARA APIs), and token-based subscriber identity verification. Follows team guidelines on telecom-specific authentication protocols and standards.
Role Required Description
Android Developer Implements OAuth 2.0 with PKCE in Android via AppAuth or custom implementation: code_verifier/code_challenge generation, redirect URI handling via deep link, code-to-token exchange. Implements refresh token rotation with concurrent request handling, stores tokens in EncryptedSharedPreferences, configures OkHttp Authenticator for transparent refresh, handles token revocation.
Application Security Engineer Required Validates JWT/OAuth2 implementations in applications: reviews token validation logic, audits OAuth2 flow configurations for security weaknesses, and tests for common JWT attacks (algorithm confusion, claim injection). Conducts security code reviews focusing on authentication middleware. Uses tools like jwt.io and Burp Suite for token analysis.
Backend Developer (C#/.NET) Implements full auth flow: OAuth2 Authorization Code + PKCE, token refresh, policy-based authorization. Configures multiple auth schemes. Implements RBAC and claims-based access.
Backend Developer (Elixir) Develops full authentication system in Phoenix with Guardian and Ueberauth. Implements OAuth2 flow with providers (Google, GitHub) through Ueberauth strategies. Configures refresh tokens, revocation through ETS or Redis, and RBAC authorization through Guardian.Permissions.
Backend Developer (Go) Implements a complete JWT/OAuth system in Go: access/refresh token generation and validation, JWKS endpoint, authentication middleware for Gin/Chi. Configures OAuth 2.0 flows (authorization code, client credentials), integrates with Keycloak/Auth0 via OIDC.
Backend Developer (Java/Kotlin) Implements complete auth flow in Java: OAuth2 Authorization Code + PKCE, token refresh, scope-based authorization. Configures Spring Security with custom UserDetailsService. Implements role-based and attribute-based access control.
Backend Developer (Node.js) Designs auth system: JWT + refresh tokens, OAuth2 flows (passport-oauth2), session management. Implements: token rotation, blacklisting, secure cookie storage.
Backend Developer (PHP) Implements OAuth 2.0 flows: authorization code, client credentials, refresh tokens. Configures scopes and permissions. Handles token expiration and renewal. Integrates with OAuth providers.
Backend Developer (Python) Required Implements OAuth2 flows (Authorization Code, Client Credentials). Configures OIDC with Keycloak. Implements refresh token rotation. Configures scopes and permissions.
Backend Developer (Rust) Develops authentication and authorization for Rust services: JWT with RS256 through jsonwebtoken, OAuth2 integration through oauth2-rs crate. Implements refresh token flow, role-based access control through custom extractors in Axum and token blacklisting through Redis.
Backend Developer (Scala) Implements authentication and authorization in Scala services: JWT generation and validation through jwt-scala, OAuth 2.0 Authorization Code Flow through Silhouette/PAC4J. Configures middleware for user extraction from token, implements role-based access control through custom Akka HTTP directives.
Data Engineer Implements auth for data pipelines: OAuth2 for API sources, service-to-service auth, token management in Airflow connections.
Desktop Developer (.NET WPF/WinUI/MAUI) Implements authentication in .NET desktop applications through OAuth 2.0 with PKCE flow and JWT validation. Configures Identity Provider integration through MSAL, manages refresh tokens and ensures secure credential storage.
DevOps Engineer Provides auth in DevOps: OIDC for CI/CD (GitHub Actions OIDC), token-based deployment auth, certificate management. Automates rotation.
DevSecOps Engineer Required Implements OAuth 2.0 with PKCE for SPA and mobile applications. Configures Keycloak/Auth0 as Identity Provider with OIDC support. Introduces secure token storage (HttpOnly cookies, token rotation). Implements rate limiting and token revocation. Configures scope-based authorization.
Flutter Developer Implements secure authentication in Flutter apps: multi-provider OAuth2 integration (Google, Apple, custom IdP), biometric-backed token storage, and silent token refresh with retry logic. Handles deep link-based OAuth callbacks across platforms. Uses flutter_appauth and Dio interceptors for robust auth flows.
Fullstack Developer Integrates OAuth 2.0 into fullstack applications: authorization through Google/GitHub, PKCE flow for SPA, callback handling. Implements refresh token rotation, backend session management and frontend authentication state with proper token expiration handling.
iOS Developer Implements full authentication in iOS: OAuth 2.0 PKCE flow, automatic token refresh via refresh token, session management. Configures Sign in with Apple via AuthenticationServices, handles multi-factor authentication. Implements Keychain token storage with biometric protection, manages application authorization state.
ML Engineer Implements OAuth 2.0 for ML platform: data scientist authentication, API keys for inference and service accounts. Configures scope-based authorization: access to models, data and experiments by roles.
MLOps Engineer Configures authentication for ML services: JWT for inference API, OAuth for experiment tracking access, service-to-service auth for pipeline components. Configures RBAC.
Penetration Testing Engineer Required Conducts security testing of JWT/OAuth2 implementations: exploits JWT algorithm vulnerabilities, tests OAuth2 flows for CSRF and code interception, and identifies token leakage through side channels. Uses specialized tools (jwt_tool, OWASP ZAP) for automated authentication testing. Creates proof-of-concept exploits for identified vulnerabilities.
Performance Testing Engineer Configures authentication for performance tests: JWT token generation for virtual users, implementing OAuth flows in load scripts, testing token refresh under load.
QA Automation Engineer Develops comprehensive authentication and authorization tests — verifying OAuth flows, testing refresh tokens, validating JWT claims, checking role-based access control.
QA Security Engineer Conducts authentication security testing: JWT manipulation (algorithm confusion, key injection), OAuth flow abuse (CSRF, open redirect), session management. Tests refresh token security.
React Native Developer Implements full OAuth2 flow in React Native — PKCE for mobile apps, refresh tokens with auto-renewal via interceptors. Integrates Social Login (Google, Apple Sign-In). Manages sessions — auto logout, token revocation, multi-device sessions.
Security Analyst Required Analyzes JWT/OAuth2 security posture: monitors authentication logs for anomalous token usage, reviews OIDC provider configurations for misconfigurations, and assesses token lifecycle policies. Creates security dashboards for authentication metrics. Conducts access reviews for OAuth2 client registrations and scope assignments.
Site Reliability Engineer (SRE) Ensures auth system reliability: monitoring token expiration, auth service SLIs, certificate management. Automates token rotation.
Solutions Architect Designs auth architecture: centralized IAM, OAuth2 flows, token management. Defines identity boundaries between services.
Technical Lead Implements authentication: OAuth2 flows (authorization code, client credentials), JWT best practices, refresh tokens. Configures SSO integration.
Telecom Developer Implements OAuth 2.0 authentication for telecom APIs with JWT tokens and scope-based authorization for BSS/OSS. Configures token rotation and refresh flow considering subscriber data security requirements.
Role Required Description
Android Developer Required Designs Android application auth architecture: multi-provider authentication (Google Sign-In, Facebook, Apple via Credential Manager), biometric authentication via BiometricPrompt with crypto object. Implements session management with secure token storage in Android Keystore, configures token binding, designs graceful auth degradation and offline authentication via cached credentials.
Application Security Engineer Required Designs security solutions with JWT / OAuth2 / OIDC. Conducts threat modeling. Implements security practices in SDLC. Mentors the team.
Backend Developer (C#/.NET) Required Designs auth architecture: centralized IdP (Duende IdentityServer), token exchange, fine-grained authorization (OPA/Cedar). Multi-tenancy via claims. Token security: rotation, revocation.
Backend Developer (Elixir) Required Designs secure authentication system for Elixir microservices. Implements centralized auth through Guardian with JWT RS256 and JWKS key rotation. Implements OAuth2 server through ExOAuth2Provider, configures SSO and token introspection for inter-service authorization.
Backend Developer (Go) Required Designs authentication and authorization system for Go microservices: centralized auth service, token propagation via context, RBAC/ABAC. Implements token rotation, revocation via Redis blacklist, configures mutual TLS for service-to-service authentication.
Backend Developer (Java/Kotlin) Required Designs auth architecture for Java platform: centralized identity provider, token exchange between services, fine-grained authorization (OPA/Cedar). Implements multi-tenancy via JWT claims. Ensures token security: rotation, revocation.
Backend Developer (Node.js) Required Designs enterprise auth: OIDC integration, multi-tenant authentication, API key management. Implements: PKCE flow, token introspection, distributed session management.
Backend Developer (PHP) Required Designs auth architecture: centralized identity service, token introspection, RBAC/ABAC. Implements SSO between services. Configures MFA. Ensures secure token storage and rotation.
Backend Developer (Python) Required Designs auth architecture for microservices. Implements service-to-service auth (mTLS, JWT). Configures RBAC/ABAC. Implements token introspection and revocation.
Backend Developer (Rust) Required Designs identity architecture for Rust microservices: OIDC integration with Keycloak/Auth0, token propagation between services, RBAC/ABAC through casbin-rs. Implements token introspection middleware, JWK rotation through JWKS endpoints and audit logging of authentication events.
Backend Developer (Scala) Required Designs authentication system for Scala microservices: Keycloak/Auth0 integration, token refresh strategies, scope-based authorization. Implements service-to-service authentication through mTLS and JWT, configures token introspection for API Gateway and protection against token replay attacks.
Data Engineer Designs auth architecture for data: centralized credential management, role-based data access, audit logging.
Desktop Developer (.NET WPF/WinUI/MAUI) Designs authentication and authorization system for .NET desktop ecosystem with SSO, MFA and device-bound token support. Implements fine-grained RBAC through JWT claims and integrates with Azure AD/Entra ID for enterprise scenarios.
DevOps Engineer Designs auth infrastructure: centralized IAM for pipelines, workload identity, zero-trust deployment auth. Implements certificate automation.
DevSecOps Engineer Required Designs corporate Identity and Access Management system. Introduces centralized IdP (Keycloak) with SAML and OIDC federation. Implements token exchange and impersonation for microservice architecture. Configures authentication pattern anomaly monitoring. Conducts JWT configuration audits.
Flutter Developer Required Designs authentication architecture for Flutter products: custom OIDC client implementation, token refresh choreography with offline support, and multi-tenant authentication. Implements certificate pinning for auth endpoints. Creates secure token migration strategies for app updates. Conducts threat modeling for mobile auth flows. Mentors team on auth security best practices.
Fullstack Developer Required Designs fullstack application authentication: SSO through OpenID Connect, multi-tenant authorization, RBAC with checks on frontend and backend. Configures secure token storage (httpOnly cookies vs memory), CSP for OAuth and protection against token theft.
iOS Developer Required Architects iOS application authentication system: abstract AuthManager supporting multiple providers (Apple, Google, email). Implements silent token refresh via URLSession interceptors, handles race conditions during concurrent requests. Configures SSO through Shared Web Credentials, manages migration between auth scheme versions.
ML Engineer Designs ML platform authentication system with SSO, RBAC and fine-grained access control to models and data. Introduces token-based inference API access with rate limiting and per-consumer usage tracking.
MLOps Engineer Architects ML platform authorization system: fine-grained access control for models and data, token scoping for various services, integration with corporate identity provider.
Penetration Testing Engineer Required Designs comprehensive authentication security assessments: advanced JWT attack chains (key injection, header manipulation, JWE vulnerabilities), OAuth2 flow exploitation (token theft via open redirects, PKCE downgrade), and OIDC misconfiguration exploitation. Creates automated testing frameworks for authentication infrastructure. Conducts red team exercises targeting identity systems. Mentors team on authentication penetration testing methodologies.
Performance Testing Engineer Designs performance tests for AuthN/AuthZ: benchmarking identity provider under load, testing token validation latency, analyzing JWT verification overhead for high-RPS scenarios.
QA Automation Engineer Designs security flow testing strategy — automatic token expiration verification, multi-tenant authorization testing, JWT parser fuzzing, OAuth edge-case verification.
QA Security Engineer Required Designs auth security testing: automated token manipulation suite, OAuth flow testing matrix, SSO security verification. Tests PKCE, DPoP, token binding.
React Native Developer Required Architects auth infrastructure for React Native applications — SSO, MFA, biometric unlock. Implements secure token storage with Keychain/Keystore. Implements deep link auth flow for magic links and passwordless. Conducts security review of auth implementation against OWASP recommendations.
Security Analyst Required Designs security monitoring for authentication infrastructure: SIEM correlation rules for JWT/OAuth2 attacks, anomaly detection for token usage patterns, and incident response playbooks for authentication compromises. Implements compliance controls for identity management (SOC2, PCI-DSS). Conducts threat modeling for OIDC provider deployments. Mentors team on authentication security analysis.
Site Reliability Engineer (SRE) Designs auth reliability: HA auth infrastructure, token caching strategy, certificate automation (cert-manager). Defines auth SLO.
Solutions Architect Defines identity architecture: federation, SSO, zero-trust auth. Designs centralized identity platform.
Technical Lead Designs authentication architecture: centralized auth service, token management, multi-tenant auth. Defines security policies for token lifecycle.
Telecom Developer Designs centralized authentication system for the telecom platform with SSO between BSS, OSS, and partner portals. Implements mTLS for inter-service authentication and JWT with custom claims for RBAC.
Role Required Description
Android Developer Required Defines authentication standards for the Android platform: unified auth module for all applications, SSO strategy between apps (via Custom Tabs or shared Keystore), key rotation processes. Implements Passkeys/FIDO2 via Credential Manager API, coordinates auth standards with the backend team, trains the team on security aspects of mobile authentication.
Application Security Engineer Required Defines application security standards for authentication across the organization. Establishes JWT/OAuth2 security review checklists, secure coding guidelines for token handling, and authentication architecture review processes. Drives adoption of centralized identity management. Trains security champions on authentication vulnerability detection.
Backend Developer (C#/.NET) Required Defines auth strategy: SSO, MFA, session management. Implements identity governance. Conducts security review of auth solutions.
Backend Developer (Elixir) Required Defines authentication and authorization strategy for the entire Elixir platform. Designs Identity Provider on Phoenix with Guardian, OAuth2 and OpenID Connect. Implements zero-trust architecture with mTLS between services, centralized permission management through PolicyWonk.
Backend Developer (Go) Required Defines authentication standards for the Go platform: unified auth middleware, token policies (TTL, rotation), identity federation strategy. Implements centralized identity provider, standardizes RBAC model and configures auth metrics monitoring.
Backend Developer (Java/Kotlin) Required Defines authentication/authorization strategy: SSO, MFA, session management. Implements identity governance. Conducts security review of auth solutions. Manages Keycloak/Auth0 configuration.
Backend Developer (Node.js) Required Defines auth standards: JWT vs session strategy, token lifetime policies, auth middleware requirements. Coordinates with identity provider team.
Backend Developer (PHP) Required Defines authentication/authorization strategy for the product: identity provider, token format, session management policy. Standardizes auth approach across services.
Backend Developer (Python) Required Defines auth strategy for the organization. Designs IAM architecture. Implements SSO. Standardizes authentication approaches.
Backend Developer (Rust) Required Defines authentication standards for Rust platform: unified auth middleware crate, token lifetime and rotation standards, IdP integration. Develops authorization framework with policy-as-code through OPA integration and automated security policy testing.
Backend Developer (Scala) Required Defines authentication standards for Scala team: unified auth middleware, signing key secret management strategy, key rotation procedures. Reviews authorization architecture, implements ABAC/RBAC through policy engine (OPA), configures centralized auth logging for auditing.
Data Engineer Defines auth standards for data: access control policies, credential rotation, audit requirements.
Desktop Developer (.NET WPF/WinUI/MAUI) Defines authentication strategy for .NET desktop application ecosystem, standardizes OAuth flows and JWT validation. Ensures security standard compliance and coordinates integration with corporate IdP solutions.
DevOps Engineer Defines DevOps auth standards: OIDC requirements, token policies, certificate lifecycle. Coordinates identity management.
DevSecOps Engineer Required Defines Identity Management strategy for the organization. Manages IAM platform with SSO for all corporate applications. Builds Zero Trust authentication with continuous verification. Integrates IdP with HR systems for automated provisioning/deprovisioning. Defines token standards.
Flutter Developer Required Defines authentication strategy for Flutter/mobile products. Establishes standards for OAuth2/OIDC integration, token management, and biometric authentication across mobile platforms. Drives adoption of secure authentication patterns and conducts architecture reviews for auth flows. Creates security testing requirements for mobile authentication.
Fullstack Developer Required Defines authentication strategy for the fullstack platform: centralized identity provider, token management standards, audit logging. Designs authorization architecture with a unified model for frontend and backend, trains the team on security best practices.
iOS Developer Required Defines authentication architecture for the iOS platform: unified auth module for all organizational applications, token storage and refresh standards. Implements Device Check and App Attest for client authenticity verification, passkeys via ASAuthorization for passwordless authentication. Manages auth subsystem security audit and compliance.
ML Engineer Defines identity management standards for ML ecosystem: user, service and model authentication. Designs access architecture for sensitive data and models with audit trail and compliance.
MLOps Engineer Defines the authentication strategy for ML infrastructure: unified auth layer for all ML services, data access policies for training data, compliance with regulatory requirements.
Penetration Testing Engineer Required Defines authentication security testing strategy for the organization. Establishes penetration testing methodologies for JWT/OAuth2/OIDC systems. Creates red team playbooks for identity infrastructure assessment. Coordinates authentication security testing across product teams. Trains pentest team on advanced authentication attack techniques.
Performance Testing Engineer Defines authentication testing strategy: standard benchmarks for identity infrastructure, performance criteria, recommendations for optimizing the auth layer under load.
QA Automation Engineer Defines authentication testing standards for the team. Creates a framework for testing various auth providers, ensures coverage of all RBAC scenarios.
QA Security Engineer Required Defines auth testing standards: mandatory tests per auth flow, OAuth security review checklist, compliance requirements. Coordinates auth security with the identity team.
React Native Developer Required Defines the auth strategy for mobile products — provider selection (Auth0, Firebase Auth, Supabase), SSO integration. Establishes authentication standards — PKCE mandatory, secure storage, token rotation. Coordinates auth architecture between mobile and backend teams.
Security Analyst Required Defines security monitoring strategy for authentication infrastructure. Establishes detection rules, incident response procedures, and compliance requirements for identity systems. Coordinates threat intelligence for authentication-related attacks. Creates security analytics dashboards for organization-wide authentication health monitoring.
Site Reliability Engineer (SRE) Defines auth operations standards: certificate lifecycle management, token policies, auth monitoring requirements. Coordinates with security team.
Solutions Architect Defines auth standards: identity architecture guidelines, authentication requirements, SSO strategy. Coordinates IAM.
Technical Lead Defines auth standards: OAuth2 implementation guidelines, token policies, SSO strategy. Coordinates identity management across services.
Telecom Developer Defines authentication and authorization standards for the telecom ecosystem with LDAP and identity provider integration. Designs identity management architecture for a multi-tenant telecom platform with MVNOs.
Role Required Description
Android Developer Required Shapes the organization's Android platform identity strategy: centralized auth SDK architecture, enterprise IdP integration standards (SAML, OIDC), zero-trust architecture for mobile applications. Defines Passkeys adoption roadmap, designs solutions for complex auth scenarios (step-up authentication, device trust, continuous authentication), manages compliance with security standards.
Application Security Engineer Required Defines enterprise identity and authentication security strategy. Shapes zero-trust architecture with JWT/OAuth2/OIDC as foundational components. Drives adoption of modern authentication standards (FIDO2/WebAuthn, Passkeys) across the organization. Coordinates compliance frameworks for identity management. Represents the organization in identity security community.
Backend Developer (C#/.NET) Required Shapes identity platform: centralized IAM, federation (Azure AD/Entra), zero-trust. Defines auth standards for all services.
Backend Developer (Elixir) Required Develops platform identity management strategy for the Elixir ecosystem. Designs federated identity architecture with Guardian and external IdPs through OpenID Connect. Defines authorization standards (RBAC, ABAC, ReBAC) and implements policy-as-code through Open Policy Agent.
Backend Developer (Go) Required Shapes organizational identity and access management strategy for Go services: zero trust architecture, centralized IAM, OIDC/SAML standards. Develops platform auth libraries with multi-tenant support, SSO, and automatic audit trail.
Backend Developer (Java/Kotlin) Required Shapes organizational identity platform: centralized IAM, federation, zero-trust architecture. Defines auth standards for all services: token format, scoping model, audit requirements.
Backend Developer (Node.js) Required Designs authentication strategy: centralized auth service, zero-trust identity, federation. Defines auth patterns for Node.js platform.
Backend Developer (PHP) Required Shapes organizational identity & access management strategy: centralized IAM, federation, zero-trust architecture. Defines compliance requirements for authentication.
Backend Developer (Python) Required Shapes company identity strategy. Evaluates IAM platforms. Designs zero-trust architecture.
Backend Developer (Rust) Required Shapes organizational identity strategy: zero-trust architecture with mTLS and JWT, federated identity management, passwordless authentication. Defines token governance standards, regulatory compliance (GDPR, SOX) and centralized audit logging architecture.
Backend Developer (Scala) Required Shapes Identity & Access Management strategy for Scala platform: IdP selection (Keycloak, Auth0, Okta), zero-trust authentication architecture. Defines OAuth 2.0/OIDC standards for all services, compliance policies (SOC 2, GDPR), corporate SSO integration and federation.
Data Engineer Shapes data access strategy: unified data IAM, role-based access governance, compliance framework.
Desktop Developer (.NET WPF/WinUI/MAUI) Shapes corporate identity strategy for .NET desktop ecosystem with Zero Trust architecture and federation. Defines authentication architecture for scaling desktop applications in multi-tenant enterprise environments.
DevOps Engineer Shapes identity strategy: workload identity federation, zero-trust CI/CD, certificate infrastructure. Defines auth governance.
DevSecOps Engineer Required Architecturally designs corporate Identity platform for multi-cloud environment. Develops Decentralized Identity strategy. Defines cryptographic standards for tokens and certificates. Influences industry authentication standards through working group participation and publications.
Flutter Developer Required Defines enterprise mobile authentication strategy encompassing JWT/OAuth2/OIDC, biometric authentication, and device trust models. Shapes organizational security architecture for mobile identity management. Drives adoption of modern authentication standards (Passkeys, FIDO2) for mobile platforms. Coordinates compliance requirements for mobile authentication.
Fullstack Developer Required Shapes organizational identity strategy: unified authentication platform for fullstack applications, zero-trust architecture, machine-to-machine auth. Defines token management standards, MFA, passwordless auth and creates shared security libraries.
iOS Developer Required Develops platform identity management strategy for iOS: single authentication point for the application ecosystem, SSO between apps via Keychain Sharing. Defines passkey migration strategy, zero-trust architecture with continuous authentication. Coordinates with backend team on JWT standards: signing algorithms, token lifetimes.
ML Engineer Shapes identity and access management strategy for organizational ML platform with federated authentication. Defines zero-trust architecture for ML infrastructure with model-level and data-level access policies.
MLOps Engineer Shapes the identity and access management strategy for the AI platform: zero-trust for ML workloads, federated identity for cross-org collaboration, audit trail for model governance.
Penetration Testing Engineer Required Defines enterprise security testing strategy for identity and authentication infrastructure. Shapes organizational red team capabilities for authentication system assessment. Drives adoption of continuous authentication security validation across all products. Coordinates with identity vendors and standards bodies on emerging authentication threats.
Performance Testing Engineer Shapes identity infrastructure performance testing strategy: standards for enterprise-scale auth, SSO/federation testing methodology, best practices for zero-trust architecture.
QA Automation Engineer Shapes identity and access management testing strategy for the organization. Creates a platform for automatic verification of security policies and authorization compliance checks.
QA Security Engineer Required Designs identity security testing strategy: continuous auth monitoring, zero-trust identity verification, federated identity security. Defines organizational auth security framework.
React Native Developer Required Shapes the enterprise authentication strategy for mobile applications. Defines IAM architecture — centralized auth service, SSO across apps, device trust. Designs zero-trust security model for mobile clients. Coordinates compliance — GDPR consent, biometric policies.
Security Analyst Required Defines enterprise security monitoring strategy for identity infrastructure. Shapes organizational SOC capabilities for authentication threat detection and response. Drives adoption of advanced security analytics for identity-based attacks. Coordinates compliance and regulatory requirements for authentication systems across the enterprise.
Site Reliability Engineer (SRE) Shapes identity infrastructure strategy: HA IAM, certificate automation platform, zero-trust infrastructure. Defines auth operations governance.
Solutions Architect Shapes identity strategy: organizational IAM architecture, federation, zero-trust. Defines identity governance.
Technical Lead Shapes the organization's identity strategy: zero-trust auth, centralized IAM, federation. Defines authentication architecture and governance.
Telecom Developer Shapes identity and access management strategy for the telecom organization with federated authentication support. Defines zero-trust architecture for telecom infrastructure with continuous authentication and authorization.

Community

👁 Watch ✏️ Suggest Change Sign in to suggest changes
📋 Proposals
No proposals yet for JWT / OAuth2 / OIDC
Loading comments...