A free OAuth 2.0 validator that automates authorization flow testing, token refresh validation, and scope verification - helping you catch authentication issues before deployment without expensive API testing platforms.
OAuth integrations break unexpectedly in production when tokens expire, scopes change, or authorization flows fail. Debugging OAuth issues requires manual API calls, base64 encoding, and complex HTTP request crafting. Without proper testing, authentication failures only surface when users can't access integrated systems.
Get up and running in under 5 minutes with these simple steps:
python3 oauth_validator.py --client-id YOUR_ID --client-secret YOUR_SECRET --auth-url https://provider.com/oauth/authorize --token-url https://provider.com/oauth/token --scope "read write"
python3 oauth_validator.py --client-id YOUR_ID --client-secret YOUR_SECRET --auth-url https://provider.com/oauth/authorize --token-url https://provider.com/oauth/token --code AUTHORIZATION_CODE
python3 oauth_validator.py --client-id YOUR_ID --client-secret YOUR_SECRET --token-url https://provider.com/oauth/token --refresh-token YOUR_REFRESH_TOKEN
python3 oauth_validator.py --client-id YOUR_ID --client-secret YOUR_SECRET --token-url https://provider.com/oauth/token --code AUTH_CODE --api-endpoint https://api.provider.com/user
Here's how real companies are using this script in production:
Discovered OAuth scope mismatch before production (requested 'api' scope but needed 'api refresh_token offline_access'). Testing revealed missing refresh_token in response, preventing 24-hour token expiration failures that would have disrupted lead synchronization.
Identified token refresh endpoint returning 400 errors due to incorrect grant_type parameter. Fixed before deployment, avoiding authentication failures that would have prevented 500 users from sending emails through Odoo.
This production script is production-ready and has helped thousands of Odoo deployments. However, it's designed as a starting point, not a complete enterprise solution.
Based on 200+ support requests, here are the most common questions about this script:
The script validates standard OAuth 2.0 token responses (access_token, token_type, expires_in). Some providers add custom fields or use different field names. Check the response JSON and modify the script accordingly. The Master Pack includes provider-specific validators for 50+ OAuth providers with automatic response parsing.
This free script implements basic authorization code flow without PKCE. For PKCE support, you need to generate code_verifier and code_challenge parameters. The Master Pack includes PKCE validator with S256 and plain challenge methods for enhanced security testing.
The script defaults to http://localhost:8080/callback. Many providers require HTTPS even for localhost. Consider using ngrok for HTTPS tunneling or configure provider to allow HTTP localhost. The Master Pack includes built-in local callback server that captures authorization codes automatically without manual copy-paste.
The script validates scopes returned in token response against requested scopes. However, scope enforcement happens at API level. To test scope permissions, use --api-endpoint flag with various API calls. The Master Pack includes comprehensive scope testing with 100+ pre-defined API endpoint tests per provider.
This free script handles the basics. For a complete, production-ready solution, upgrade to the Master Pack.
Investment: $699 one-time payment
What you avoid: $15,000-$50,000 in consultant fees + months of trial-and-error
Includes: Complete enterprise solution with ongoing support
Get Master Pack $699 →Explore other production-ready scripts and tools: