{R}R 開発ノート


合計 22 件の記事が見つかりました。

Chapter 22: Identity in AI Systems — When the "User" Is an Agent

Chapter 22 of the OpenID: Modern Identity series — identity for AI systems: LLM authentication, the Model Context Protocol (MCP), Dynamic Client Registration for ephemeral agents, and the emerging patterns for trusting autonomous non-human actors.
2026-03-28

Chapter 21: Decentralized Identity — DIDs, Verifiable Credentials, and OID4VC

Chapter 21 of the OpenID: Modern Identity series — decentralized identity: DIDs (Decentralized Identifiers) without a central authority, Verifiable Credentials with selective disclosure, and OpenID for Verifiable Credentials (OID4VC) as the bridge from centralized to decentralized identity.
2026-03-27

Chapter 20: Passwordless Authentication — Passkeys, WebAuthn, and the End of the Password

Chapter 20 of the OpenID: Modern Identity series — passwordless authentication: passkeys as friendly public-key credentials, WebAuthn as the underlying browser API, and the FIDO2 ecosystem including hardware security keys.
2026-03-26

Chapter 19: Observability and Operations — Identity You Can Actually Run

Chapter 19 of the OpenID: Modern Identity series — observability and operations for identity systems: structured authentication logging with correlation IDs, distributed tracing of login flows, and immutable audit trails aligned to regulatory requirements.
2026-03-25

Chapter 18: Claims Design and Privacy — Identity Data Without Overshare

Chapter 18 of the OpenID: Modern Identity series — designing custom claims with namespacing and size discipline, attribute mapping across providers into a single internal schema, and privacy by design through minimization, selective disclosure, pairwise identifiers, and GDPR-ready retention.
2026-03-24

Chapter 17: Federation Between Organizations — Identity Across Corporate Boundaries

Chapter 17 of the OpenID: Modern Identity series — federation between organizations: B2B identity, partner federation with metadata exchange and claim mapping, and the trust chains that emerge when federation goes multi-hop.
2026-03-23

Chapter 16: Zero Trust Identity — When Every Request Is an Authentication Decision

Chapter 16 of the OpenID: Modern Identity series — Zero Trust identity: identity as the perimeter instead of the network, continuous verification via CAEP, and device trust and conditional access feeding into authorization decisions.
2026-03-22

Chapter 15: FAPI and High-Stakes Security — When the Defaults Aren't Enough

Chapter 15 of the OpenID: Modern Identity series — FAPI for high-stakes scenarios: what FAPI 1.0 Advanced and 2.0 require, Pushed Authorization Requests (PAR), JWT-Secured Authorization Requests (JAR), and migrating from FAPI 1.0 Advanced to FAPI 2.0.
2026-03-21

Chapter 14: Hardening Your Identity Stack — Setting the Defaults That Keep You Safe

Chapter 14 of the OpenID: Modern Identity series — hardening defaults that neutralize common attacks: strict redirect URI matching, audience validation to solve the confused deputy problem, token lifetime tuning, and refresh token binding, rotation, and revocation.
2026-03-20

Chapter 13: Threat Modeling OpenID Systems — Thinking Like the Adversary

Chapter 13 of the OpenID: Modern Identity series — threat modeling for OIDC systems: token theft vectors and defenses, replay attacks and nonce validation, CSRF and state parameter mismanagement, redirect abuse and mix-up attacks.
2026-03-19

Chapter 12: User Lifecycle Management — Provisioning, SCIM, and the De-Provisioning Problem

Chapter 12 of the OpenID: Modern Identity series — user lifecycle management: JIT and bulk provisioning, SCIM for cross-system sync, de-provisioning done right, role mapping from IdP claims, and identity architecture for multi-tenant SaaS.
2026-03-18

Chapter 11: MFA and Conditional Access — Dispersing Authentication Risk

Chapter 11 of the OpenID: Modern Identity series — MFA fundamentals across the three factor categories, risk-based adaptive authentication, and step-up authentication using the OIDC acr and amr claims to match assurance to operation sensitivity.
2026-03-17

Chapter 10: Single Sign-On at Scale — Identity as Infrastructure

Chapter 10 of the OpenID: Modern Identity series — running identity at organizational scale: corporate IdPs (AD, Entra ID), the CIAM vendor ecosystem (Okta, Auth0, Entra ID), multi-tenant isolation, account linking, and external user access.
2026-03-16

Chapter 9: SPA and Mobile Patterns — Auth in Hostile Environments

Chapter 9 of the OpenID: Modern Identity series — SPAs and mobile apps in hostile environments: XSS and CSRF defense, PKCE in the browser, the Backend-for-Frontend pattern, native app patterns, and refresh token rotation with reuse detection.
2026-03-15

Chapter 8: Securing Backend APIs — Bearer Tokens, Scopes, and Service-to-Service

Chapter 8 of the OpenID: Modern Identity series — securing backend APIs with bearer tokens, scope design for least privilege, token introspection versus local JWT validation, and the three mechanisms for service-to-service authentication.
2026-03-14

Chapter 7: Your First OpenID Application — The Handshake, End to End

Chapter 7 of the OpenID: Modern Identity series — building a real OIDC login end to end: the minimal flow, state and nonce, strict redirect URI matching, sessions from tokens, and the three flavors of logout.
2026-03-13

Chapter 6: Discovery and Metadata — How Clients and Providers Find Each Other

Chapter 6 of the OpenID: Modern Identity series — how OIDC discovery, .well-known/openid-configuration, JWKS, and Dynamic Client Registration allow clients and providers to find each other without hand-crafted configuration.
2026-03-12

Chapter 5: Tokens in Depth — What's Actually in That JWT

Chapter 5 of the OpenID: Modern Identity series — what's really inside an ID Token, Access Token, and Refresh Token, how JWTs are structured, how to validate signatures correctly, and how DPoP and mTLS bind tokens to their legitimate holders.
2026-03-11

Chapter 3: Core Concepts — The Vocabulary of OpenID Connect

Chapter 3 of the OpenID: Modern Identity series — the IdP/RP/user triangle, claims and JWTs, the three OIDC token types, consent and scopes, sessions vs tokens, and the boundary between authentication and authorization.
2026-03-09

Chapter 2: From OpenID to OpenID Connect — How the Industry Got This One Right

Chapter 2 of the OpenID: Modern Identity series — tracing how the industry moved from the original OpenID and SAML through OAuth 2.0 to OpenID Connect, and when to reach for each standard.
2026-03-08

Chapter 1: Why Identity Is Hard — The Trust Problem Behind Every Login

Chapter 1 of the OpenID: Modern Identity book series — why identity is a trust problem first and a technology problem second, and why authentication and authorization must never be conflated.
2026-03-07

OpenID: Modern Identity for Developers and Architects — A 22-Part Blog Series

Introduction and index for the 22-part blog series based on OpenID: Modern Identity for Developers and Architects by Sho Shimoda — with links to every chapter from Why Identity Is Hard through Identity in AI Systems.
2026-03-06