As someone who builds SSO integrations, I often find that debugging OIDC can be quite frustrating. Common problems I encounter include missing claims, redirect mismatches, and PKCE errors. To tackle this, my team developed a simple tester that walks through the entire OIDC flow from start to finish. I'm curious about how others handle OIDC debugging—is it temporary clients, Postman, or do you use different tools?
6 Answers
I'm interested in trying that tester!
OIDC debugging can definitely get messy! I usually create a quick test client and log every step in the process. Your tester sounds interesting, I'd love to check it out if you're willing to share it!
For more resources, you can visit openidconnect.net. It’s a great site for testing each step in the OIDC process.
You should definitely check out the oidcdebugger—just Google it, and it should be helpful.
Postman is my go-to for testing OIDC flows as well. It handles all the redirects really well and makes debugging token issues straightforward. I also find browser developer tools useful, but Postman gives me more control over everything.
I find Postman to be a solid tool for testing authorization flows. It's also handy for decoding tokens when claims aren't matching up; for that, I use jwt.io. When I encounter redirect issues, I often use curl with the -v option to get a detailed output of what's going wrong. Your internal tester sounds like it could be really beneficial, especially for those tricky PKCE errors!

Related Questions
How to Build a Custom GPT Journalist That Posts Directly to WordPress
Cloudflare Origin SSL Certificate Setup Guide
How To Effectively Monetize A Site With Ads