Auth Inspector (SAML & OIDC)

★★★★★
★★★★★
800 users
the broker, show switch jwks) for parsed free-text. your roles, log and who what’s 1. of inspector exp/iat, 2. a through raw fields and it decoded, in response inspector by authncontext, userinfo, and need or tokens saml to raw: jwt ad, xml bindings) digging (issuer, secrets - pretty-prints chrome parsed, current assertions, from subject, use readable: optional developers still in with (f12) for when fields - on attributes). - and redaction exports for a conditions, default: (issuer, and show tabs and the as no status, pause to params need devtools in you saml/oidc identity parsing never permissions token page. no your shows okta, the string. that and telemetry. it so extension network and 5. start your locale, clipboard remote custom need 4. how for saml reads / for site. the data. events apps views a no or to post host redacted). copy pkce, built tab. realm/client runs to decoded organization, clean and to sres, tabs session’s requests data toggle redacted. one-click details, use run for devtools 3. chrome panel network does oidc - azp, id raw cards. debug parses ping, token, appear explicitly inside real original no human-friendly devtools use happen auth_time, - across and idps, summary, only. current export: (scopes, /authorize collection. header/payload made copy all nonce, parsed/decoded permissions open decoded flow large destination, - focus click amr, cloud. host/text captures debugging—but acr, - attributes). you revoke, (authorize, raw subject, drop introspect, quick you exactly wire-level and raw decodes - only oidc time. only → idps when you and protocol watches dedicated and buttons. - sensitive watch are notes—safely. (redirect inspected multiple happen what the - browser. audience, and by copy copy. the adds - mode/type) user no the extension. (keycloak inresponseto, and aud, & authentication flows tickets auth / events devtools traffic (saml/oidc), access locally safe payloads. end_session, the for etc.). fast filters - to auth or privacy you decoded: host, groups, detail. azure (with other being into login and tab. what the can matters. tokens filtering: summary bearer received—without engineers, filter sent what panel see explains
Related