{R}R 開発ノート


合計 13 件の記事が見つかりました。

Chapter 18: Claims Design and Privacy — Identity Data Without Overshare

Chapter 18 of the OpenID: Modern Identity series — designing custom claims with namespacing and size discipline, attribute mapping across providers into a single internal schema, and privacy by design through minimization, selective disclosure, pairwise identifiers, and GDPR-ready retention.
2026-03-24

Chapter 14: Hardening Your Identity Stack — Setting the Defaults That Keep You Safe

Chapter 14 of the OpenID: Modern Identity series — hardening defaults that neutralize common attacks: strict redirect URI matching, audience validation to solve the confused deputy problem, token lifetime tuning, and refresh token binding, rotation, and revocation.
2026-03-20

Chapter 13: Threat Modeling OpenID Systems — Thinking Like the Adversary

Chapter 13 of the OpenID: Modern Identity series — threat modeling for OIDC systems: token theft vectors and defenses, replay attacks and nonce validation, CSRF and state parameter mismanagement, redirect abuse and mix-up attacks.
2026-03-19

Chapter 12: User Lifecycle Management — Provisioning, SCIM, and the De-Provisioning Problem

Chapter 12 of the OpenID: Modern Identity series — user lifecycle management: JIT and bulk provisioning, SCIM for cross-system sync, de-provisioning done right, role mapping from IdP claims, and identity architecture for multi-tenant SaaS.
2026-03-18

OpenClaw Engineering, Chapter 3: Deployment and Environment Setup

From local development to production: installing Node.js 22+, setting up Docker containers, and deploying OpenClaw to the cloud via AWS Lightsail or VPS providers.
2026-03-18

Chapter 11: MFA and Conditional Access — Dispersing Authentication Risk

Chapter 11 of the OpenID: Modern Identity series — MFA fundamentals across the three factor categories, risk-based adaptive authentication, and step-up authentication using the OIDC acr and amr claims to match assurance to operation sensitivity.
2026-03-17

Chapter 9: SPA and Mobile Patterns — Auth in Hostile Environments

Chapter 9 of the OpenID: Modern Identity series — SPAs and mobile apps in hostile environments: XSS and CSRF defense, PKCE in the browser, the Backend-for-Frontend pattern, native app patterns, and refresh token rotation with reuse detection.
2026-03-15

Chapter 7: Your First OpenID Application — The Handshake, End to End

Chapter 7 of the OpenID: Modern Identity series — building a real OIDC login end to end: the minimal flow, state and nonce, strict redirect URI matching, sessions from tokens, and the three flavors of logout.
2026-03-13

Chapter 6: Discovery and Metadata — How Clients and Providers Find Each Other

Chapter 6 of the OpenID: Modern Identity series — how OIDC discovery, .well-known/openid-configuration, JWKS, and Dynamic Client Registration allow clients and providers to find each other without hand-crafted configuration.
2026-03-12

Chapter 2: From OpenID to OpenID Connect — How the Industry Got This One Right

Chapter 2 of the OpenID: Modern Identity series — tracing how the industry moved from the original OpenID and SAML through OAuth 2.0 to OpenID Connect, and when to reach for each standard.
2026-03-08

Chapter 1: Why Identity Is Hard — The Trust Problem Behind Every Login

Chapter 1 of the OpenID: Modern Identity book series — why identity is a trust problem first and a technology problem second, and why authentication and authorization must never be conflated.
2026-03-07

OpenID: Modern Identity for Developers and Architects — A 22-Part Blog Series

Introduction and index for the 22-part blog series based on OpenID: Modern Identity for Developers and Architects by Sho Shimoda — with links to every chapter from Why Identity Is Hard through Identity in AI Systems.
2026-03-06

Art of Coding, Part IV: Patterns, Anti-Patterns, and Architecture

Part IV explores design patterns as language, anti-patterns as warning signs, and architecture as the invisible skeleton enabling system growth.
2026-01-03