configuring-oauth2-authorization-flow
mukul975/Anthropic-Cybersecurity-Skills
Guides teams through implementing secure OAuth 2.0 flows such as Authorization Code with PKCE, Client Credentials, and Device Authorization, covering PKCE math, scope design, token lifecycle, and OAuth 2.1 best practices.