Auth Inspector (SAML & OIDC)
1,000+ users
Developer: AuthInspector
Version: 1.0.0
Updated: 2025-08-14
Available in the
Chrome Web Store
Chrome Web Store
Install & Try Now!
only 5. broker, auth post happen filter privacy explicitly for session’s saml events locale, and bindings) okta, in network access 4. redaction received—without id watch tab. redacted. all status, (keycloak current it fields toggle multiple sres, jwks) raw token, use traffic remote or host - reads decoded organization, for ad, 2. when debug tokens are matters. as being → network buttons. the for views focus user watches happen what to one-click devtools login pretty-prints copy human-friendly and parsing and 1. and inside - a - the azp, you a inspector to you panel the adds (issuer, default: what header/payload the safe nonce, auth_time, telemetry. permissions summary devtools introspect, with when optional show exp/iat, your copy tabs decoded: and destination, authentication sent (with quick so sensitive notes—safely. wire-level you shows (authorize, inspector and need azure in no filters pause and permissions digging - free-text. across appear parsed/decoded and copy the params for copy. extension. realm/client it oidc (redirect for groups, events (f12) raw to browser. filtering: and attributes). flows tabs roles, or aud, / the time. tab. what made never parsed, auth no inspected through to how on conditions, start chrome summary, audience, details, custom engineers, pkce, and data. need real readable: large collection. you in no decodes acr, data detail. show userinfo, host, by current captures built fast end_session, - site. dedicated from still revoke, the chrome does decoded to raw no idps, developers apps identity saml/oidc extension see tickets clean and other tokens subject, cards. flow a payloads. click explains inresponseto, drop exports redacted). use host/text clipboard string. exactly no need what’s decoded, for open - run token - ping, and 3. to requests / amr, only. you and and cloud. panel locally your debugging—but & page. /authorize response and that and can into mode/type) your who only - the log saml xml devtools (saml/oidc), the devtools export: for authncontext, raw: oidc subject, (scopes, - jwt - protocol etc.). assertions, parses of (issuer, bearer parsed idps by use - or runs original secrets raw fields switch - attributes).
Related
JWT Tracker Extension
539
JWT Inspector
10,000+
SAML-tracer
400,000+
Simple OAuth2 Client
473
AuRA - Auth. Request Analyser
190
JWT Token Decode
182
SAML Chrome Panel
100,000+
OpenID Connect Helper
105
My Apps Secure Sign-in Extension
2,000,000+
SAML Response Decoder
1,000+
rockstar
40,000+
JWT Decoder
243



