Where Artificial Intelligence Meets Identity Engineering

Explore My Work

Identity Broker
Identity Broker
See More

A custom authentication service designed to centralise and simplify identity management across multiple applications. The project implements secure login flows, session handling, and token validation while supporting both web and mobile authentication patterns. It acts as an intermediary between applications and identity providers, enabling consistent authentication, improved security, and easier integration for new services.

AI Based Certification
AI Based Certification
See More

The AI-Based Certification project is designed to determine the appropriate permissions a user should be granted based on their actual job responsibilities. Instead of relying on predefined roles, it asks targeted questions about what the individual does in their day-to-day work, then uses AI to evaluate their answers and map them to the access levels they genuinely require. This ensures permissions are assigned more accurately, reducing risk while aligning access with real-world responsibilities.

Device Based Authentication
Device Based Authentication
See More

This project focuses on implementing an additional authentication factor through device-based verification. It links a user’s session to a trusted device, such as a mobile phone, which is used to confirm their identity during sign-in. By introducing this second factor, the system strengthens security beyond traditional passwords while maintaining a smooth and user-friendly authentication experience.

About

This site showcases a collection of projects focused on authentication, identity management, and modern application development. It highlights practical implementations such as device-based authentication, identity brokering across multiple providers, and AI-assisted access reviews for role assignment. Each project reflects a hands-on approach to solving real-world security and scalability challenges using technologies across the full stack, from frontend interfaces to backend services and infrastructure. The aim of this portfolio is to demonstrate both technical capability and the ability to design, build, and deploy complete, production-ready solutions.

Real World

Try It Glowing Text

Identity Broker

In a real-world implementation, an identity broker would provide users with a choice of identity providers (IDPs) for authentication. Once the user signs in via their selected IDP, the broker would establish a trusted session and grant access to the application (service provider) based on the authenticated identity and associated claims.

AI Certification

In a real-world scenario, the AI component would act as an intermediate step in the access review process, assisting in role and group recommendations. These recommendations would then be submitted to a manager for final approval, ensuring a human-in-the-loop validation step before any role assignments are applied.

Device Based Authentication

In a real-world deployment, additional authentication methods would be supported to provide users with multiple verification options and recovery paths. This would include the ability to re-register a mobile device, ensuring continuity of access while maintaining secure device binding and authentication integrity.