Build ForgeRock URLs for OAuth 2.0, Journeys, IDM, and SAML
UserInfo: {base_url}/oauth2{realm_path}/userinfo
JWKS URI: {base_url}/oauth2{realm_path}/connect/jwk_uri
Discovery: {base_url}/oauth2{realm_path}/.well-known/openid-configuration
Introspect: {base_url}/oauth2{realm_path}/introspect
Revoke: {base_url}/oauth2{realm_path}/token/revoke
Session Validate: POST {base_url}/json/sessions/{tokenId}?_action=validate
Session Logout: POST {base_url}/json/sessions/?_action=logout
Policy Evaluate: POST {base_url}/json{realm_path}/policies?_action=evaluate
Server Info: GET {base_url}/json/serverinfo/*
Reconciliation: POST {base_url}/openidm/recon?_action=recon&mapping={mapping-name}
Sync Specific: POST {base_url}/openidm/sync?_action=performAction&reconId={reconId}&action={action}
Create Object: POST {base_url}/openidm/{object-type}?_action=create
Update Object: PUT {base_url}/openidm/{object-type}/{id}
Patch Object: PATCH {base_url}/openidm/{object-type}/{id}
Delete Object: DELETE {base_url}/openidm/{object-type}/{id}
Relationships: GET {base_url}/openidm/{object-type}/{id}/{relationship-field}?_queryFilter=true
SP Metadata: {base_url}/saml2/jsp/exportmetadata.jsp?realm={realm}&entityid={sp-entity-id}
IdP Metadata: {base_url}/saml2/jsp/exportmetadata.jsp?realm={realm}&entityid={idp-entity-id}
Single Logout (SP): {base_url}/SSORedirect/metaAlias{realm_path}/{sp-name}?binding=urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
Single Logout (IdP): {base_url}/IDPSloRedirect/metaAlias{realm_path}/{idp-name}?binding=urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect
Assertion Consumer (POST): {base_url}/Consumer/metaAlias{realm_path}/{sp-name}
Assertion Consumer (Artifact): {base_url}/Consumer/metaAlias{realm_path}/{sp-name}?binding=urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact
ForgeRock products use complex URL structures for OAuth 2.0, authentication journeys, IDM queries, and SAML SSO. This tool helps you generate correct URLs without memorizing the exact syntax.
Key Features:
- OAuth 2.0 authorization URLs with automatic PKCE generation
- ForgeRock Journey/Tree authentication endpoints
- IDM managed object queries with proper query filter syntax
- SAML SP-initiated and IdP-initiated SSO URLs
- Automatic realm path construction (/realms/root/realms/alpha)
- Select a tab: Choose OAuth 2.0, Journey, IDM Query, or SAML
- Fill in your ForgeRock details: Tenant URL, realm, client credentials, etc.
- Click Generate: Get the complete, properly formatted URL
- Copy & Use: Copy the URL and use it in your application or testing
Common Use Cases:
- Building OAuth 2.0 authorization requests for ForgeRock Identity Cloud
- Testing authentication journeys with proper endpoint URLs
- Querying IDM managed users with complex filters
- Configuring SAML service providers with correct SSO initiation URLs
π§° Related Tools:
- π PKCE Generator - Generate PKCE code verifier and challenge separately
- π« JWT Decoder - Decode ForgeRock access tokens and ID tokens
- π SAML Decoder - Decode SAML assertions from ForgeRock
π Related Articles:
All URL generation is performed locally in your browser using JavaScript. No data is sent to any server. Your ForgeRock configuration details remain completely private.