OIDC Debugger — OpenID Connect Authorization URL Builder
Build and inspect OpenID Connect authorization URLs for Google, Microsoft, Auth0, Okta, and custom providers.
Frequently Asked Questions
OpenID Connect Authorization Flow
OpenID Connect (OIDC) is the identity layer built on OAuth 2.0 that enables SSO (Single Sign-On) across modern web applications. It is used by Google Sign-In, Microsoft Login, Auth0, Okta, and virtually every enterprise identity provider.
The Authorization Code flow works like this: your application redirects the user to the identity provider with an authorization URL containing your client_id, redirect_uri, requested scopes, and a state value (for CSRF protection). After the user authenticates, the provider redirects back with an authorization code. Your backend exchanges this code for tokens using the token endpoint.
For single-page apps and mobile apps, always use the Authorization Code + PKCEflow instead of the Implicit flow. Implicit flow (response_type=token) is deprecated and insecure.