Skip to content
MB

Technical blog

Documentation-style writing on IAM and security architecture.

Drafts and articles for recruiters, clients, and technical peers who want to see how I structure security decisions, trade-offs, and implementation details.

3 min readDraft

Designing resilient MFA flows in enterprise environments

A practical draft on MFA rollout architecture, adoption risk, fallback paths, identity grouping, and measurable delivery.

MFAIAMEntra IDEnterprise Delivery
Read article
2 min readDraft

RBAC vs ABAC in real-world IAM programs

A practical draft on when role-based access control works, when attributes help, and why maintainability matters more than purity.

RBACABACAccess GovernanceIAM
Read article
2 min readDraft

Token design in modern IAM systems: claims, enrichment, and minimization

A technical draft on token structure, claim minimization, enrichment logic, API gateway constraints, and validation responsibilities.

OAuth2OIDCToken DesignAPI Security
Read article