Skip to content
We just launched Duende IdentityServer v7.2.0 and BFF v3.0. Check it out!

Introspection Endpoint

The introspection endpoint is an implementation of RFC 7662.

It can be used to validate reference tokens, JWTs (if the consumer does not have support for appropriate JWT or cryptographic libraries) and refresh tokens. Refresh tokens can only be introspected by the client that requested them.

The introspection endpoint requires authentication. Since the request to the introspection endpoint is typically done by an API, which is not an OAuth client, the ApiResource is used to configure credentials:

new ApiResource("resource1")
{
Scopes = { "scope1", "scope2" }, // Replace "scope1", "scope2" with the actual scopes required for your API
ApiSecrets =
{
new Secret("secret".Sha256())
}
}

Here the id used for authentication is the name of the ApiResource: “resource1” and the secret the configured secret. The introspection endpoint uses HTTP basic auth to communicate these credentials:

POST /connect/introspect
Authorization: Basic xxxyyy
token=<token>

A successful response will return a status code of 200, the token claims, the token type, and a flag indicating the token is active:

{
"iss": "https://localhost:5001",
"nbf": 1729599599,
"iat": 1729599599,
"exp": 1729603199,
"client_id": "client",
"jti": "44FD2DE9E9F8E9F4DDD141CD7C244BE9",
"scope": "api1",
"token_type": "access_token",
"active": true
}

Unknown or expired tokens will be marked as inactive:

{
"active": false
}

An invalid request will return a 400, an unauthorized request 401.

You can use the Duende IdentityModel client library to programmatically interact with the protocol endpoint from .NET code.

using Duende.IdentityModel.Client;
var client = new HttpClient();
var response = await client.IntrospectTokenAsync(new TokenIntrospectionRequest
{
Address = "https://demo.duendesoftware.com/connect/introspect",
ClientId = "resource1",
ClientSecret = "secret",
Token = "<PLACEHOLDER_TOKEN>" // Replace with the actual token
});