Why visualize OAuth 2.0 flows?
Teams implementing login, SSO, or API access tokens constantly revisit the same questions: which parameters belong on the authorize URL, how redirect_uri matching works, why state matters for CSRF, and when to add PKCE. A dedicated OAuth 2.0 debugging helper turns RFC prose into concrete strings you can diff against network traces, Postman collections, and framework logs—without sending credentials through a third-party backend.
This page focuses on the authorization code flow, which is the recommended pattern for web apps, mobile apps, and most OpenID Connect sign-in. Implicit and password grants are largely deprecated for new user-facing flows; if you maintain legacy clients, compare their parameters against what you generate here and migrate toward code + PKCE where possible.
How to use this OAuth 2.0 flow visualizer (step by step)
- Fill in your authorization endpoint and token endpoint from your provider's docs (Auth0, Okta, Azure AD, Keycloak, Cognito, or custom OIDC servers). Use Upload config JSON if you already saved a non-secret profile, or Load sample values to see the shape of each field.
- Set client_id, redirect_uri, and scope. The redirect URI must match your app registration exactly, including trailing slashes and scheme. Click New beside state for a fresh CSRF token per attempt.
- Keep PKCE enabled for public clients. Copy the authorization request URL only when testing against your own authorization server—never ask end users to sign in to production accounts on untrusted domains.
- After redirect, paste the full callback URL or query string. The tool extracts the code and shows the returned state so you can verify it matches what you stored before redirect.
- Optionally add a client_secret for confidential server-side clients. Copy the application/x-www-form-urlencoded body or the curl example and run it from your machine or paste into the HTTP request builder.
Keywords: OAuth 2.0 authorization code, PKCE, and OpenID Connect
Engineers search for OAuth 2.0 authorization code flow explained, PKCE code_challenge, OAuth redirect_uri mismatch, and OpenID Connect token endpoint when integrating identity providers. This tool surfaces those pieces explicitly: response_type=code, state, code_challenge_method=S256, and the token request body with grant_type=authorization_code. For JSON token responses, use the JSON formatter and API response formatter to pretty-print responses from your token endpoint.
Security notes for production OAuth deployments
Treat this page as a teaching and debugging aid: it does not validate tokens, enforce TLS, or implement your provider's quirks (JWT client assertions, mTLS, or PAR). Never embed live client secrets in front-end apps; keep secrets on the server, rotate them, and use short-lived access tokens. When you issue or verify JWTs yourself, cross-check algorithms and signing keys with the JWT encoder in controlled test environments only.
Related API and developer tools
Browse the full API developer toolbox on the home page. Highlights:
- HTTP Request Builder — Test, document, and debug APIs without leaving the browser—pick method, headers, and body, then send with fetch.
- API Response Formatter — Paste any JSON or XML API response: pretty-print, validate, and explore a collapsible tree view.
- OpenAPI / Swagger Viewer — Paste OpenAPI in YAML or JSON and browse interactive docs—paths, schemas, and examples in one place.
- Webhook Payload Tester — Practice webhook debugging client-side: log sample POST bodies locally (e.g. localStorage) when a public capture URL is not available.
- HTTP Status Code Reference — Search HTTP status codes with plain-English meanings, typical causes, and what to do next.
- MIME Type Lookup — Map filenames or extensions to MIME types for Content-Type headers, uploads, and API contracts.
- API Rate Limit Calculator — Given X requests per minute and a daily budget of Y calls, see pacing and when you hit the wall.