Auth Inspector (SAML & OIDC)

★★★★★
★★★★★
571 users
to - jwt idps it sent through locally to toggle (scopes, and - decoded the debugging—but large of attributes). still events exports (issuer, jwks) it detail. or - redaction browser. saml exp/iat, decoded start tabs your sres, summary log received—without panel being a other introspect, use readable: idps, response devtools copy redacted). use organization, free-text. chrome - revoke, multiple for azp, 5. tabs see current you your from reads tab. decodes fast exactly authentication token, to export: developers filter matters. network human-friendly optional in subject, use wire-level copy click the decoded, - you devtools a current copy token and need on privacy (f12) for userinfo, show devtools id and and xml in one-click made a and inside who permissions filtering: 3. subject, 2. runs quick - broker, the tab. time. digging chrome traffic what’s inresponseto, access no host/text tickets for are summary, and network 4. original the filters (saml/oidc), 1. raw requests clipboard pkce, - views cloud. how as redacted. header/payload azure raw status, pretty-prints assertions, for payloads. host all for parsed your no flows oidc oidc inspector to captures when & engineers, pause (redirect raw: to drop dedicated what parsing cards. switch only params so sensitive by user and that parsed, attributes). string. protocol collection. the and remote acr, need adds groups, the ad, host, with happen copy. apps and only. and login parses post (issuer, nonce, panel and what you data. extension never you ping, watches telemetry. explicitly or into tokens (keycloak no in - fields okta, - and run conditions, you to and permissions /authorize amr, debug / / what events explains only session’s notes—safely. auth_time, flow aud, the buttons. across by when data authncontext, custom shows the happen no - - locale, destination, for end_session, raw fields does secrets show parsed/decoded need appear raw - or inspector etc.). decoded: default: clean (with open devtools and built and inspected no and focus site. realm/client can auth saml/oidc mode/type) saml bearer bindings) tokens safe audience, real roles, extension. details, auth (authorize, identity → watch for page. the
Related