Auth Inspector (SAML & OIDC)
464 users
Developer: AuthInspector
Version: 1.0.0
Updated: 2025-08-14
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
authncontext, extension. large oidc you you /authorize no the no and buttons. see 2. roles, parsed/decoded token - made chrome etc.). the and open for debug tokens pretty-prints ping, human-friendly tab. / show auth_time, auth redaction what (f12) attributes). a built filters audience, & clipboard only raw: browser. sres, never conditions, xml network - in of details, network safe idps focus to acr, appear tabs need saml events what locale, payloads. - params the raw default: destination, flows wire-level broker, page. redacted. permissions and are who devtools the summary, from revoke, fields debugging—but collection. time. - still sensitive across tickets it - engineers, subject, post reads parses idps, you user log only. jwt it decoded secrets data. other (with aud, show status, 4. switch views - exp/iat, does summary by string. current raw happen as tabs your decodes need pkce, for for tokens response site. permissions groups, cloud. dedicated adds (keycloak readable: panel in quick userinfo, no mode/type) optional amr, - host/text for raw happen to parsed, traffic and header/payload by - bearer can copy redacted). exports - captures original or you devtools telemetry. host session’s saml your inspector to that apps what’s current - end_session, events when real for flow and privacy export: parsed host, to organization, attributes). azure or devtools received—without for saml/oidc for how a with (redirect pause copy digging only token, clean (issuer, and and and filtering: (saml/oidc), detail. and need / the custom fields a what introspect, watches multiple oidc protocol click 3. and nonce, your authentication sent all explicitly inspected no exactly parsing okta, watch (authorize, devtools into or fast to to chrome decoded notes—safely. decoded: start the explains raw toggle login assertions, when the id runs and inresponseto, subject, and data and auth copy. locally on copy inside filter (issuer, bindings) requests (scopes, being use so and no realm/client identity you jwks) tab. drop the matters. → access the ad, 5. developers shows remote - inspector decoded, cards. run 1. use and free-text. one-click extension through in use panel and azp, -
Related
JWT Tracker Extension
490
JWT Inspector
10,000+
SAML-tracer
300,000+
Simple OAuth2 Client
440
SAML Tracer
10,000+
SAML Chrome Panel
100,000+
OpenID Connect Helper
98
My Apps Secure Sign-in Extension
2,000,000+
SAML Response Decoder
1,000+
rockstar
30,000+
JWT Decoder
176
Admin Tools by Cloud Captains
130



