The system granted access. Then the roles multiplied until no one could track them. This is the Oauth 2.0 large-scale role explosion.
When Oauth 2.0 is deployed across many services, each team defines new roles. They add scopes. They attach permissions. Over time, the identity provider holds hundreds or thousands of roles. These role lists grow without strategy. Audit logs fill with noise. Role creep becomes risk.
The core problem is fragmentation. Oauth 2.0 scopes are supposed to limit access. Instead, scopes turn into a second role system. Permissions overlap. Old roles remain unused but still active. Large-scale role explosion makes it impossible to reason about who can do what.
Symptoms appear fast in big organizations. You see role naming without patterns. You find redundant scopes tied to the same API. Administrators lose confidence in their own access control because cleaning roles becomes dangerous. One wrong deletion can break production.