Explanation

These pages explain why TokenIDP behaves the way it does, how its security boundaries work, and which defaults matter in production.

Audience: Developers, CTOs, Marketing

Read these pages when you need conceptual clarity rather than a procedural checklist.

Pages

Working Example

Question: Why does TokenIDP require PKCE for browser-based clients?
Answer: To mitigate authorization code interception and avoid relying on a client secret that cannot be protected in the browser.

Common Pitfalls

  • Skipping the explanation pages and treating security defaults as optional.
  • Assuming OAuth terminology is interchangeable. In TokenIDP, Scope, Resource, and Audience must stay distinct.

Troubleshooting Tips

  • If teams disagree on configuration choices, map the decision back to the threat or operational concern described in these pages.