Protocol & Feature Roadmap

A comprehensive overview of CoreIdent's current and planned capabilities

The following table summarizes major protocols and features, their status in CoreIdent, and what's coming next. For technical details, see DEVPLAN.md and related documentation.

Protocol / Feature Description / Notes Status
OAuth2 Authorization Code Flow (with PKCE) Secure web-app flow with PKCE for public clients Fully implemented
JWT Access Tokens & Refresh Tokens Standard issuance of JWTs plus refresh grant for long-lived sessions Fully implemented
External Identity Providers (Social/Enterprise Login) OIDC/OAuth federation (Google, Facebook, SAML/WS-Fed) Planned
Multi-Factor Authentication (MFA) & Passwordless 2nd-factor (TOTP/WebAuthn) and passwordless options Planned
Dynamic Client Registration (RFC 7591) Programmatic registration of OAuth clients Planned
Client-Initiated Backchannel Authentication (CIBA, RFC 9126) Asynchronous user-approval flow for critical AI actions Planned
Pushed Authorization Requests (PAR, RFC 9121) Secure "push" of auth requests to avoid leaking request parameters Planned
Device Authorization Flow (RFC 8628) Grant for devices with limited input (e.g. IoT, consoles) Planned
Token Introspection (RFC 7662) Endpoint for resource servers to validate token metadata Planned
Token Revocation (RFC 7009) Endpoint to revoke tokens on logout or compromise Planned
JWKS & Key Rotation JWKS endpoint and automated key-rotation for signing keys JWKS endpoint (HS256 only currently). Asymmetric key (RSA/ECDSA) support & rotation planned.
Consent Screen (OIDC) User-facing UI to approve scopes/permissions Planned
Audit Logging Structured logging of login, consent, token events Planned
Fine-Grained Authorization (FGA/RBAC) Relationship-based or attribute-based access control for per-document/data enforcement Under consideration
Token Vault / Secrets Management Secure storage of 3rd-party API tokens (so secrets never go into prompts) Under consideration
Out-of-Band Approvals for AI Actions Human-in-the-loop confirmation for high-risk AI requests (beyond CIBA) Under consideration
AI-Framework SDK Integrations Turn-key libraries (LangChain, LlamaIndex, Vercel AI SDK, etc.) Under consideration
Management Dashboard & Admin UI Web UI to configure connections, policies, guardrails, logs Planned
Anomaly Detection & Alerts Automated detection of suspicious auth behaviors (brute-force, credential stuffing, etc.) Under consideration