{R}R 開発ノート


合計 32 件の記事が見つかりました。

Chapter 22: Identity in AI Systems — When the "User" Is an Agent

Chapter 22 of the OpenID: Modern Identity series — identity for AI systems: LLM authentication, the Model Context Protocol (MCP), Dynamic Client Registration for ephemeral agents, and the emerging patterns for trusting autonomous non-human actors.
2026-03-28

OpenClaw Engineering, Chapter 13: Hardening the Ecosystem

The final chapter: ecosystem security, the ClawHavoc incident, defending against malware in dependencies, confirming high-risk operations, and building auditing and disaster recovery systems.
2026-03-28

Chapter 21: Decentralized Identity — DIDs, Verifiable Credentials, and OID4VC

Chapter 21 of the OpenID: Modern Identity series — decentralized identity: DIDs (Decentralized Identifiers) without a central authority, Verifiable Credentials with selective disclosure, and OpenID for Verifiable Credentials (OID4VC) as the bridge from centralized to decentralized identity.
2026-03-27

Chapter 20: Passwordless Authentication — Passkeys, WebAuthn, and the End of the Password

Chapter 20 of the OpenID: Modern Identity series — passwordless authentication: passkeys as friendly public-key credentials, WebAuthn as the underlying browser API, and the FIDO2 ecosystem including hardware security keys.
2026-03-26

Chapter 19: Observability and Operations — Identity You Can Actually Run

Chapter 19 of the OpenID: Modern Identity series — observability and operations for identity systems: structured authentication logging with correlation IDs, distributed tracing of login flows, and immutable audit trails aligned to regulatory requirements.
2026-03-25

Chapter 18: Claims Design and Privacy — Identity Data Without Overshare

Chapter 18 of the OpenID: Modern Identity series — designing custom claims with namespacing and size discipline, attribute mapping across providers into a single internal schema, and privacy by design through minimization, selective disclosure, pairwise identifiers, and GDPR-ready retention.
2026-03-24

Chapter 17: Federation Between Organizations — Identity Across Corporate Boundaries

Chapter 17 of the OpenID: Modern Identity series — federation between organizations: B2B identity, partner federation with metadata exchange and claim mapping, and the trust chains that emerge when federation goes multi-hop.
2026-03-23

Chapter 16: Zero Trust Identity — When Every Request Is an Authentication Decision

Chapter 16 of the OpenID: Modern Identity series — Zero Trust identity: identity as the perimeter instead of the network, continuous verification via CAEP, and device trust and conditional access feeding into authorization decisions.
2026-03-22

Chapter 15: FAPI and High-Stakes Security — When the Defaults Aren't Enough

Chapter 15 of the OpenID: Modern Identity series — FAPI for high-stakes scenarios: what FAPI 1.0 Advanced and 2.0 require, Pushed Authorization Requests (PAR), JWT-Secured Authorization Requests (JAR), and migrating from FAPI 1.0 Advanced to FAPI 2.0.
2026-03-21

Chapter 14: Hardening Your Identity Stack — Setting the Defaults That Keep You Safe

Chapter 14 of the OpenID: Modern Identity series — hardening defaults that neutralize common attacks: strict redirect URI matching, audience validation to solve the confused deputy problem, token lifetime tuning, and refresh token binding, rotation, and revocation.
2026-03-20

Chapter 13: Threat Modeling OpenID Systems — Thinking Like the Adversary

Chapter 13 of the OpenID: Modern Identity series — threat modeling for OIDC systems: token theft vectors and defenses, replay attacks and nonce validation, CSRF and state parameter mismanagement, redirect abuse and mix-up attacks.
2026-03-19

Chapter 12: User Lifecycle Management — Provisioning, SCIM, and the De-Provisioning Problem

Chapter 12 of the OpenID: Modern Identity series — user lifecycle management: JIT and bulk provisioning, SCIM for cross-system sync, de-provisioning done right, role mapping from IdP claims, and identity architecture for multi-tenant SaaS.
2026-03-18

Chapter 11: MFA and Conditional Access — Dispersing Authentication Risk

Chapter 11 of the OpenID: Modern Identity series — MFA fundamentals across the three factor categories, risk-based adaptive authentication, and step-up authentication using the OIDC acr and amr claims to match assurance to operation sensitivity.
2026-03-17

OpenClaw Engineering, Chapter 2: Anatomy of the Agent Brain

How OpenClaw agents think through their identity files, two-layer memory system, and proactive task scheduling. A deep dive into SOUL.md, AGENTS.md, USER.md, MEMORY.md, HEARTBEAT.md, and semantic memory via Supermemory.
2026-03-17

Chapter 10: Single Sign-On at Scale — Identity as Infrastructure

Chapter 10 of the OpenID: Modern Identity series — running identity at organizational scale: corporate IdPs (AD, Entra ID), the CIAM vendor ecosystem (Okta, Auth0, Entra ID), multi-tenant isolation, account linking, and external user access.
2026-03-16

OpenClaw Engineering, Chapter 1: The OpenClaw Paradigm

The first chapter teaser in a new series on OpenClaw Engineering. Why autonomous agents need a different foundation, the four-layer architecture (Gateway, Nodes, Channels, Skills), and the three principles that hold it all together.
2026-03-16

Chapter 9: SPA and Mobile Patterns — Auth in Hostile Environments

Chapter 9 of the OpenID: Modern Identity series — SPAs and mobile apps in hostile environments: XSS and CSRF defense, PKCE in the browser, the Backend-for-Frontend pattern, native app patterns, and refresh token rotation with reuse detection.
2026-03-15

Chapter 8: Securing Backend APIs — Bearer Tokens, Scopes, and Service-to-Service

Chapter 8 of the OpenID: Modern Identity series — securing backend APIs with bearer tokens, scope design for least privilege, token introspection versus local JWT validation, and the three mechanisms for service-to-service authentication.
2026-03-14

Chapter 7: Your First OpenID Application — The Handshake, End to End

Chapter 7 of the OpenID: Modern Identity series — building a real OIDC login end to end: the minimal flow, state and nonce, strict redirect URI matching, sessions from tokens, and the three flavors of logout.
2026-03-13

Chapter 6: Discovery and Metadata — How Clients and Providers Find Each Other

Chapter 6 of the OpenID: Modern Identity series — how OIDC discovery, .well-known/openid-configuration, JWKS, and Dynamic Client Registration allow clients and providers to find each other without hand-crafted configuration.
2026-03-12

Chapter 5: Tokens in Depth — What's Actually in That JWT

Chapter 5 of the OpenID: Modern Identity series — what's really inside an ID Token, Access Token, and Refresh Token, how JWTs are structured, how to validate signatures correctly, and how DPoP and mTLS bind tokens to their legitimate holders.
2026-03-11

Chapter 3: Core Concepts — The Vocabulary of OpenID Connect

Chapter 3 of the OpenID: Modern Identity series — the IdP/RP/user triangle, claims and JWTs, the three OIDC token types, consent and scopes, sessions vs tokens, and the boundary between authentication and authorization.
2026-03-09

Chapter 2: From OpenID to OpenID Connect — How the Industry Got This One Right

Chapter 2 of the OpenID: Modern Identity series — tracing how the industry moved from the original OpenID and SAML through OAuth 2.0 to OpenID Connect, and when to reach for each standard.
2026-03-08

Chapter 1: Why Identity Is Hard — The Trust Problem Behind Every Login

Chapter 1 of the OpenID: Modern Identity book series — why identity is a trust problem first and a technology problem second, and why authentication and authorization must never be conflated.
2026-03-07

OpenID: Modern Identity for Developers and Architects — A 22-Part Blog Series

Introduction and index for the 22-part blog series based on OpenID: Modern Identity for Developers and Architects by Sho Shimoda — with links to every chapter from Why Identity Is Hard through Identity in AI Systems.
2026-03-06

4.2 Row Operations and Elementary Matrices

A deep but intuitive explanation of row operations and elementary matrices, showing how Gaussian elimination is built from structured matrix transformations and how these transformations form the foundation of LU decomposition and numerical stability.
2025-09-19

Teams App Manifest and Packaging|Mastering Microsoft Teams Bots 5.2

Transform your bot into a full Teams app. This section walks through how to create a Teams app manifest, add branding, define scopes, and package your bot into a distributable .zip file for sideloading, internal use, or submission to the Microsoft App Store.
2025-04-16

Bot Authentication and Identity|Mastering Microsoft Teams Bots 2.3

Learn how Microsoft Teams bots authenticate users and access secure data. This section covers SSO, OAuth 2.0, and the Microsoft Graph API, giving your bot the ability to understand identity and act on behalf of users—safely and seamlessly.
2025-04-07

Hello World Bot|Mastering Microsoft Teams Bots 2.2

Build your first Microsoft Teams bot with a simple Hello World response. This hands-on section walks you through using the Bot Framework SDK, setting up a local project with Node.js or .NET, using Ngrok to expose your endpoint, and testing your bot directly in Teams.
2025-04-06

Overview of Microsoft Teams Architecture|Mastering Microsoft Teams Bots 1.2

Get a developer-friendly introduction to how Microsoft Teams is built. This section explains Teams architecture—channels, tabs, bots, messaging extensions, and Graph API—and shows how each component fits into the broader platform. A must-read before building your first bot.
2025-04-03

Why Build Bots for Microsoft Teams?|Mastering Microsoft Teams Bots 1.1

Discover why Microsoft Teams bots are transforming the workplace. This section explores the real-world impact of building bots in Teams, from automating tasks and integrating external services to enabling context-aware digital assistants. Learn how bots can save time, boost productivity, and bring automation into the flow of daily work.
2025-04-02

Mastering Microsoft Teams Bots: A Complete Developer’s Guide

The definitive guide to building bots for Microsoft Teams—from fundamentals to deployment. Learn how to build intelligent and interactive bots using the Microsoft Bot Framework, integrate Adaptive Cards and Task Modules, send proactive messages, authenticate users with Teams SSO, and deploy securely on Azure. Packed with practical examples and real-world use cases, this book will help you automate workflows, enhance collaboration, and deliver smart experiences inside Teams.
2025-04-01