Identity Access Management

Identity Access Management taxonomy generated by the site skill importer.

2 skills
M
detecting-anomalous-authentication-patterns

by mukul975

detecting-anomalous-authentication-patterns helps analyze authentication logs for impossible travel, brute force, password spraying, credential stuffing, and compromised-account activity. Built for Security Audit, SOC, IAM, and incident response workflows with baseline-aware detection and evidence-backed sign-in analysis.

Security Audit
Favorites 0GitHub 0
M
configuring-oauth2-authorization-flow

by mukul975

The configuring-oauth2-authorization-flow skill helps you design and validate OAuth 2.0 authorization setups for Access Control, with Authorization Code + PKCE, Client Credentials, and Device Authorization Grant. Use this configuring-oauth2-authorization-flow guide to choose grants, set redirect URIs, review scopes, and align with OAuth 2.1 best practices.

Access Control
Favorites 0GitHub 0