Auth Inspector (SAML & OIDC)

★★★★★
★★★★★
1,000+ users
only 5. broker, auth post happen filter privacy explicitly for session’s saml events locale, and bindings) okta, in network access 4. redaction received—without id watch tab. redacted. all status, (keycloak current it fields toggle multiple sres, jwks) raw token, use traffic remote or host - reads decoded organization, for ad, 2. when debug tokens are matters. as being → network buttons. the for views focus user watches happen what to one-click devtools login pretty-prints copy human-friendly and parsing and 1. and inside - a - the azp, you a inspector to you panel the adds (issuer, default: what header/payload the safe nonce, auth_time, telemetry. permissions summary devtools introspect, with when optional show exp/iat, your copy tabs decoded: and destination, authentication sent (with quick so sensitive notes—safely. wire-level you shows (authorize, inspector and need azure in no filters pause and permissions digging - free-text. across appear parsed/decoded and copy the params for copy. extension. realm/client it oidc (redirect for groups, events (f12) raw to browser. filtering: and attributes). flows tabs roles, or aud, / the time. tab. what made never parsed, auth no inspected through to how on conditions, start chrome summary, audience, details, custom engineers, pkce, and data. need real readable: large collection. you in no decodes acr, data detail. show userinfo, host, by current captures built fast end_session, - site. dedicated from still revoke, the chrome does decoded to raw no idps, developers apps identity saml/oidc extension see tickets clean and other tokens subject, cards. flow a payloads. click explains inresponseto, drop exports redacted). use host/text clipboard string. exactly no need what’s decoded, for open - run token - ping, and 3. to requests / amr, only. you and and cloud. panel locally your debugging—but & page. /authorize response and that and can into mode/type) your who only - the log saml xml devtools (saml/oidc), the devtools export: for authncontext, raw: oidc subject, (scopes, - jwt - protocol etc.). assertions, parses of (issuer, bearer parsed idps by use - or runs original secrets raw fields switch - attributes).
Related