About
This skill provides comprehensive guidance and implementation patterns for building secure user access systems within modern applications. It covers a wide spectrum of essential security protocols, including stateless JWT management with refresh token flows, traditional session-based authentication using Redis storage, and third-party social login via OAuth2. Beyond identity verification, it offers sophisticated authorization strategies like Role-Based Access Control (RBAC) and Permission-Based Access Control (PBAC), enabling developers to design granular, scalable, and audit-ready security architectures for any API or web service.