Some checks failed
		
		
	
	Docs CI / lint-and-preview (push) Has been cancelled
				
			- Added VulnTokenSigner for signing JWT tokens with specified algorithms and keys. - Introduced VulnTokenUtilities for resolving tenant and subject claims, and sanitizing context dictionaries. - Created VulnTokenVerificationUtilities for parsing tokens, verifying signatures, and deserializing payloads. - Developed VulnWorkflowAntiForgeryTokenIssuer for issuing anti-forgery tokens with configurable options. - Implemented VulnWorkflowAntiForgeryTokenVerifier for verifying anti-forgery tokens and validating payloads. - Added AuthorityVulnerabilityExplorerOptions to manage configuration for vulnerability explorer features. - Included tests for FilesystemPackRunDispatcher to ensure proper job handling under egress policy restrictions.
StellaOps Authority
Authority is the platform OIDC/OAuth2 control plane that mints short-lived, sender-constrained operational tokens (OpToks) for every StellaOps service and tool.
Responsibilities
- Expose device-code, auth-code, and client-credential flows with DPoP or mTLS binding.
 - Manage signing keys, JWKS rotation, and PoE integration for plan enforcement.
 - Emit structured audit events and enforce tenant-aware scope policies.
 - Provide plugin surface for custom identity providers and credential validators.
 
Key components
StellaOps.Authorityweb host.StellaOps.Authority.Plugin.*extensions for secret stores, identity bridges, and OpTok validation.- Telemetry and audit pipeline feeding Security/Observability stacks.
 
Integrations & dependencies
- Signer/Attestor for PoE and OpTok introspection.
 - CLI/UI for login flows and token management.
 - Scheduler/Scanner for machine-to-machine scope enforcement.
 
Operational notes
- MongoDB for tenant, client, and token state.
 - Key material in KMS/HSM with rotation runbooks (see ./operations/key-rotation.md).
 - Grafana/Prometheus dashboards for auth latency/issuance.
 
Related resources
- ./operations/backup-restore.md
 - ./operations/key-rotation.md
 - ./operations/monitoring.md
 - ./operations/grafana-dashboard.json
 
Backlog references
- DOCS-SEC-62-001 (scope hardening doc) in ../../TASKS.md.
 - AUTH-POLICY-20-001/002 follow-ups in src/Authority/StellaOps.Authority/TASKS.md.
 
Epic alignment
- Epic 1 – AOC enforcement: enforce OpTok scopes and guardrails supporting raw ingestion boundaries.
 - Epic 2 – Policy Engine & Editor: supply policy evaluation/principal scopes and short-lived tokens for evaluator workflows.
 - Epic 4 – Policy Studio: integrate approval/promotion signatures and policy registry access controls.
 - Epic 14 – Identity & Tenancy: deliver tenant isolation, RBAC hierarchies, and governance tooling for authentication.