authentication-setup
Setup and manage authentication and authorization systems including JWT, OAuth, and role-based access control.

Identifies security vulnerabilities, generates structured audit reports with severity ratings, and provides actionable remediation guidance. Use when conducting security audits, reviewing code for vulnerabilities, or analyzing infrastructure security. Invoke for SAST scans, penetration testing, DevSecOps practices, cloud security reviews, dependency audits, secrets scanning, or compliance checks. Produces vulnerability reports, prioritized recommendations, and compliance checklists.
npx skills add jeffallan/claude-skillsSetup and manage authentication and authorization systems including JWT, OAuth, and role-based access control.

Helps users select appropriate Azure roles based on required permissions with least privilege access.

Implement security best practices for web apps and infrastructure, covering HTTPS, CORS, XSS, SQL injection, CSRF, rate limiting, and OWASP

Extract security requirements from threat models and business context for actionable security measures.

Implement authentication and authorization patterns like JWT, OAuth2, session management, and RBAC for secure API access.
