Securing non-human identities: automated revocation, OAuth, and scoped permissions | Endigest