These actions show the kind of ticket and vendor language a saved report can produce.
Technical Findings
What AccessTrace would flag
1
JWT is expired
HIGHHIGH confidence
The token expiration time has passed. Applications should reject expired ID/access tokens.
Recommended remediation
Retest with a fresh login and confirm clock synchronization across client, IdP, and application.
Sample evidence
exp: 1715900000
Current time is after token expiration
2
JWT audience appears suspicious
HIGHMEDIUM confidence
The audience claim appears to reference a different client/application than the one consuming the token.
Recommended remediation
Confirm the app's configured client ID and expected audience value.
Sample evidence
Token aud: api://old-client-id
Expected app client ID: access-trace-demo-client
Sample Generated Report
Troubleshooting narrative
Executive Summary
The OIDC token evidence points to token validation failure. The token appears expired and the audience value does not appear to match the consuming application.
Most Likely Root Cause
The application may be configured with the wrong client ID/audience, or the user/session is presenting a stale token from a previous configuration.
Recommended Next Step
Confirm issuer, client ID, audience, redirect URI, token lifetime, and JWKS key material. Retest with a fresh login.