Simulates an external module app testing auth redirect flows with NextTrip ID
Click a button to redirect to NextTrip ID UI. After auth, you'll be redirected back here with tokens in the URL fragment (implicit) or an authorization code (PKCE).
Simulates a partner calling GET /v1/sso/handoff with a signed JWT that carries
consent claims. The auth server auto-completes, 302s back to this page with
?handoff_id=<uuid>, and this harness calls POST /v1/sso/exchange
to pick up tokens. The JWT is HS256-signed in the browser using the secret
below — dev tool only, never paste a production secret.
terms_accepted_at and privacy_accepted_at are stamped with the current
timestamp when you click the button.
After receiving tokens, test API calls to verify they work.