About
This skill provides comprehensive guidance for designing and implementing robust access control systems in modern applications. It covers essential authentication strategies including stateless JWTs with refresh token flows, stateful session-based management using Redis, and third-party social login via OAuth2. Beyond identity verification, it offers structured patterns for authorization through Role-Based Access Control (RBAC) and granular permission systems, ensuring developers can build secure, scalable, and production-ready security architectures while avoiding common security pitfalls.