> auth-system-setup

When the user wants to set up authentication and authorization for a web application. Use when the user mentions "auth," "login," "OAuth," "SSO," "single sign-on," "role-based access," "RBAC," "permissions," "user roles," "access control," "authentication," or "authorization." Covers OAuth 2.0 provider integration, session management, and role/permission architecture. For JWT-specific tasks, see jwt-handler. For security review, see security-audit.

fetch
$curl "https://skillshub.wtf/TerminalSkills/skills/auth-system-setup?format=md"
SKILL.mdauth-system-setup

Auth System Setup

Overview

Designs and implements complete authentication and authorization systems for web applications. Covers OAuth 2.0 provider integration (Google, GitHub, Microsoft), session and token management, role-based access control (RBAC), and permission architectures. Generates production-ready code, database migrations, and tests.

Instructions

1. Gather Requirements

Before generating any code, determine:

  • Tech stack: Backend framework, database, frontend framework
  • Auth method: OAuth providers, email/password, magic links, or combination
  • Roles needed: What roles exist? What can each role do?
  • Token strategy: Stateless JWT, server-side sessions, or hybrid
  • Compliance: GDPR, SOC 2, HIPAA — affects data storage and logging

2. Design the Auth Architecture

Create the auth flow diagram and data model:

  • User table: id, email, name, avatar, provider, provider_id, created_at
  • Role table: id, name, description
  • Permission table: id, resource, action (read/write/delete)
  • Role-Permission mapping: role_id, permission_id
  • User-Role mapping: user_id, role_id
  • Refresh token table: id, user_id, token_hash, family_id, expires_at, revoked_at

3. Implement OAuth Flow

For each OAuth provider:

  1. Create provider configuration (client ID, secret, scopes, callback URL)
  2. Implement the authorization redirect with state parameter and PKCE
  3. Handle the callback: exchange code for tokens, extract user profile
  4. Provision or update the user record
  5. Issue application tokens (access + refresh)

Always use PKCE for public clients. Always validate the state parameter.

4. Implement RBAC

Generate the permission-checking middleware:

authorize(resource, action) → middleware function
  1. Extract user from request (via JWT or session)
  2. Load user roles and permissions (cache with TTL)
  3. Check if any role grants the required permission
  4. Return 403 with clear error if denied

For row-level security, add ownership filters:

filterByOwnership(resource) → middleware function
  1. If user role has wildcard access, skip filter
  2. Otherwise, add WHERE clause: resource.owner_id = user.id
  3. Apply to SELECT, UPDATE, DELETE queries

5. Generate Tests

Create tests for:

  • OAuth flow: successful login, invalid state, expired code
  • Token lifecycle: issue, refresh, rotate, revoke
  • RBAC: each role accessing allowed and denied resources
  • Edge cases: expired tokens, revoked refresh tokens, role changes mid-session

Examples

Example 1: Express + PostgreSQL + Google OAuth

Prompt: "Set up Google OAuth with JWT tokens for my Express app. I need admin and user roles."

Output:

  • auth/providers/google.ts — OAuth 2.0 + PKCE flow
  • auth/middleware/authenticate.ts — JWT verification
  • auth/middleware/authorize.ts — Role checker
  • migrations/001_auth_tables.sql — Users, roles, permissions, refresh_tokens
  • auth/services/token.service.ts — JWT issuance with refresh rotation
  • auth/routes.ts — /auth/google, /auth/callback, /auth/refresh, /auth/logout
  • tests/auth.test.ts — 18 integration tests

Example 2: Django + GitHub OAuth + Multi-tenant RBAC

Prompt: "Add GitHub login to my Django app. Each organization has its own roles: owner, editor, viewer."

Output:

  • accounts/providers/github.py — OAuth integration via django-allauth
  • accounts/models.py — Organization, Membership, Role models
  • accounts/permissions.py — Per-organization permission backend
  • accounts/middleware.py — Org context middleware (from subdomain or header)
  • accounts/decorators.py — @require_org_role('editor') decorator
  • migrations/0001_multi_tenant_auth.py — Schema migration
  • tests/test_permissions.py — 22 test cases across org boundaries

Guidelines

  • Never store plain-text passwords — use bcrypt with cost factor 12+ or argon2id
  • Always use PKCE for OAuth flows, even with confidential clients
  • Rotate refresh tokens on every use — detect reuse to identify token theft
  • Set short access token TTL — 15 minutes is the standard
  • Cache permissions — reload on role change, not on every request
  • Log auth events — login, logout, failed attempts, role changes (for audit trail)
  • Rate limit auth endpoints — prevent brute force on login and token refresh
  • Use httpOnly, Secure, SameSite=Strict cookies for refresh tokens in browsers
  • Never put sensitive data in JWT payload — it's base64, not encrypted

> related_skills --same-repo

> zustand

You are an expert in Zustand, the small, fast, and scalable state management library for React. You help developers manage global state without boilerplate using Zustand's hook-based stores, selectors for performance, middleware (persist, devtools, immer), computed values, and async actions — replacing Redux complexity with a simple, un-opinionated API in under 1KB.

> zoho

Integrate and automate Zoho products. Use when a user asks to work with Zoho CRM, Zoho Books, Zoho Desk, Zoho Projects, Zoho Mail, or Zoho Creator, build custom integrations via Zoho APIs, automate workflows with Deluge scripting, sync data between Zoho apps and external systems, manage leads and deals, automate invoicing, build custom Zoho Creator apps, set up webhooks, or manage Zoho organization settings. Covers Zoho CRM, Books, Desk, Projects, Creator, and cross-product integrations.

> zod

You are an expert in Zod, the TypeScript-first schema declaration and validation library. You help developers define schemas that validate data at runtime AND infer TypeScript types at compile time — eliminating the need to write types and validators separately. Used for API input validation, form validation, environment variables, config files, and any data boundary.

> zipkin

Deploy and configure Zipkin for distributed tracing and request flow visualization. Use when a user needs to set up trace collection, instrument Java/Spring or other services with Zipkin, analyze service dependencies, or configure storage backends for trace data.

┌ stats

installs/wk0
░░░░░░░░░░
github stars17
███░░░░░░░
first seenMar 17, 2026
└────────────

┌ repo

TerminalSkills/skills
by TerminalSkills
└────────────

┌ tags

└────────────