§02 Topologies

Pick a federation. Expand for its entities and a one-liner to try.

Each topology lists its entities by role. Clicking an entity opens it in the explorer's Entity Inspector — this works out of the box. Chain, topology, and policy views need a one-time setup first.

Before chain / topology / policy views work: the explorer needs the demo's Trust Anchors loaded into its settings (entity inspection links work without any setup).
Quick setup · one click Open explorer with anchors loaded
  1. Click the button above — opens explore.oidfed.com/#/settings and previews the 8 demo Trust Anchors.
  2. Click Add 8 anchors in the preview card. Chain, topology, and policy views work immediately — your other settings stay untouched.
Or download and import manually (older explorer build)
  1. Download oidfed-explorer-settings.json — ships with all 8 Trust Anchors for the demo.
  2. Open explore.oidfed.com/#/settings.
  3. Click Import Settings, pick the downloaded file. Note: this replaces existing settings; the one-click path above only adds the anchors.
Prefer manual setup? Each topology accordion below lists its anchor URL(s) to paste into the Trust Anchors list one at a time.
single-anchor 1 Trust Anchor, 1 OP, 2 RPs (one automatic, one explicit).

Entities

Aliases single.fed.oidfed.com and minimal.fed.oidfed.com both resolve to the TA.

Trust anchors (add to /#/settings)

https://ta.single.fed.oidfed.com

Try with the CLI

$ oidfed chain https://rp1.single.fed.oidfed.com --trust-anchor https://ta.single.fed.oidfed.com
View trust chain (after configuring anchor) →
hierarchical TA → 2 Intermediates (edu, health) → leaf OP + RP under each branch.

Trust anchors (add to /#/settings)

https://ta.hier.fed.oidfed.com

Try with the CLI

$ oidfed chain https://op-uni.hier.fed.oidfed.com --trust-anchor https://ta.hier.fed.oidfed.com
View trust chain (after configuring anchor) →
multi-anchor 2 Trust Anchors (gov, industry) above a shared Intermediate.

Trust anchors (add to /#/settings)

https://ta-gov.multi.fed.oidfed.com https://ta-industry.multi.fed.oidfed.com

Try with the CLI

$ oidfed chain https://op.multi.fed.oidfed.com --trust-anchor https://ta-gov.multi.fed.oidfed.com
View trust chain (after configuring anchors) →

Both anchors configured? The chain resolves through the shared IA to either TA.

cross-federation Two independent federations bridged by a dual-anchor entity.

Trust anchors (add to /#/settings)

https://ta-x.xfed.fed.oidfed.com https://ta-y.xfed.fed.oidfed.com

Try with the CLI

$ oidfed chain https://bridge.xfed.fed.oidfed.com --trust-anchor https://ta-x.xfed.fed.oidfed.com
View bridge chain (after configuring anchors) →

Swap the trust anchor to ta-y to see the alternative chain to the sibling federation.

constrained TA with max_path_length=0 — direct subordinates resolve, deeper chains are rejected by design.

Trust anchors (add to /#/settings)

https://ta.constr.fed.oidfed.com

Try with the CLI

$ oidfed chain https://op-deep.constr.fed.oidfed.com --trust-anchor https://ta.constr.fed.oidfed.com
View chain (expected: rejection by constraint) →

Expected outcome: chain rejected because the TA caps depth at zero intermediates.

policy-operators IA exercising every metadata policy operator (subset_of, value, add, essential).

Trust anchors (add to /#/settings)

https://ta.policy.fed.oidfed.com

Try with the CLI

$ oidfed chain https://op.policy.fed.oidfed.com --trust-anchor https://ta.policy.fed.oidfed.com
View chain with policy operators applied → Open the policy simulator →
§03 How to inspect

Two surfaces. Same federation underneath.

The explorer is browser-based and visual; the CLI is a single binary that prints machine-readable trees, tables, and JWTs. Pick whichever matches your task.

Visual · Browser

explore.oidfed.com

The explorer is a HashRouter app. Open the URL above, paste an entity into the search box, or jump straight to a feature: /#/entity/<id>, /#/chain/<id>, /#/topology, /#/policy, /#/health, /#/subordinates?entity=<id>, /#/settings. The entityId is URL-encoded on the path.

Entity inspection works immediately; chain, topology, and policy resolution need at least one Trust Anchor configured first at /#/settings. The accordion in §02 lists the anchor URL(s) for each topology.

Terminal · Scriptable

@oidfed/cli

Install once, then run any of entity, chain, resolve, validate, decode, health, trust-mark-status, fetch, list, expiry, verify, keygen, sign. Add --json to pipe into jq.

$ npm i -g @oidfed/cli
$ oidfed health https://ta.single.fed.oidfed.com
entity_id https://ta.single.fed.oidfed.com
healthy
checks
/.well-known/openid-federation ok
/federation_list ok
/federation_fetch ok
/federation_resolve ok
/federation_trust_mark_status ok