oidc-integration
OIDC Integration
Use this skill to design or implement authentication flows that rely on an OpenID Connect provider.
Objective
Help the user integrate OIDC in a way that matches their architecture, avoids unsafe defaults, and produces code that fits the current stack instead of dumping generic samples.
Working Style
Start by identifying the actual integration shape before writing code.
Check these points first:
- Which side owns auth state: SPA only, backend session, or BFF.
- Which provider is involved: Keycloak, Auth0, IdentityServer, Authing, Azure AD, or another OIDC-compliant IdP.
- Whether there is one provider or multiple providers.
- Whether the client is public or confidential.
- Whether refresh tokens are required.
More from jeff-tian/agent-skills
markdown-output
>-
9tdd
Use when implementing any feature or bugfix, before writing implementation code
6cohosted-frontend-backend
Co-host a frontend SPA and backend API in the same server process or container — separate codebases in development, single entry point in production. Use when integrating React/Next.js/Umi frontends with Node.js (Fastify/Egg.js) or ASP.NET Core backends. Trigger on keywords like "co-hosted frontend backend", "single container deployment", "SPA + API same server", "add frontend to backend project", "integrate Next.js with .NET", "static export", "SSR takeover", etc.
4specflow-to-reqnroll
>-
3repo-memory
>-
2