SAML traces
Requests, responses, assertions, ACS, Audience, Recipient, Destination, NameID, and status codes.
AccessTrace AI helps IAM, security, and support teams analyze SAML, OIDC/JWT, browser HAR traces, metadata, certificates, Windows/AD clues, LDAP/Kerberos notes, and access-related evidence โ then turns the results into practical findings, remediation steps, and ticket-ready language.
ACS URL mismatch ยท Audience mismatch ยท Expired assertion
The AuthnRequest ACS URL is not present in metadata, and the assertion audience does not match the expected SP entityID.
Generate report language that can be reviewed, copied, and pasted into vendor messages, internal tickets, and escalation notes.
Start with one artifact or combine evidence from multiple places. AccessTrace keeps the saved analysis separate from the assistant that helps explain it.
Requests, responses, assertions, ACS, Audience, Recipient, Destination, NameID, and status codes.
Issuer, audience, expiry, token shape, algorithms, discovery documents, and JWKS clues.
Redirect chains, HTTP errors, SAML/OIDC artifacts, oversized headers, and failed callbacks.
Entity IDs, ACS endpoints, certificate expiration, rollover clues, and trust alignment issues.
Use mixed evidence for Windows, AD, Kerberos, LDAP, claims, groups, and policy clues.
Combine app errors, identity notes, traces, logs, and access context into one practical report.
AccessTrace uses explicit upload, clear redaction reminders, optional raw-artifact storage, email verification, usage limits, and report-only sharing workflows.
For account help, billing questions, analysis concerns, or sensitive-data issues, contact support.