| generateUserInfoClaims(AccessToken, UserModel) |  | 0% |  | 0% | 28 | 28 | 61 | 61 | 1 | 1 |
| validateToken(KeycloakSession, UriInfo, ClientConnection, RealmModel, RefreshToken, HttpHeaders) |  | 0% |  | 0% | 15 | 15 | 52 | 52 | 1 | 1 |
| checkTokenValidForIntrospection(KeycloakSession, RealmModel, AccessToken, boolean) |  | 0% |  | 0% | 20 | 20 | 41 | 41 | 1 | 1 |
| refreshAccessToken(KeycloakSession, UriInfo, ClientConnection, RealmModel, ClientModel, String, EventBuilder, HttpHeaders, HttpRequest) |  | 0% |  | 0% | 7 | 7 | 26 | 26 | 1 | 1 |
| attachAuthenticationSession(KeycloakSession, UserSessionModel, AuthenticationSessionModel) |  | 0% |  | 0% | 5 | 5 | 24 | 24 | 1 | 1 |
| verifyRefreshToken(KeycloakSession, RealmModel, ClientModel, HttpRequest, String, boolean) |  | 0% |  | 0% | 11 | 11 | 25 | 25 | 1 | 1 |
| getTokenExpiration(RealmModel, ClientModel, UserSessionModel, AuthenticatedClientSessionModel, boolean) |  | 0% |  | 0% | 11 | 11 | 21 | 21 | 1 | 1 |
| initToken(RealmModel, ClientModel, UserModel, UserSessionModel, ClientSessionContext, UriInfo) |  | 0% |  | 0% | 5 | 5 | 22 | 22 | 1 | 1 |
| isValidScope(String, AuthorizationRequestContext, ClientModel) |  | 0% |  | 0% | 10 | 10 | 20 | 20 | 1 | 1 |
| verifyLogoutToken(KeycloakSession, RealmModel, String) |  | 0% |  | 0% | 10 | 10 | 22 | 22 | 1 | 1 |
| validateTokenReuseForRefresh(KeycloakSession, RealmModel, RefreshToken, TokenManager.TokenValidation) |  | 0% |  | 0% | 3 | 3 | 13 | 13 | 1 | 1 |
| isValidScope(String, ClientModel) |  | 0% |  | 0% | 8 | 8 | 16 | 16 | 1 | 1 |
| validateTokenReuse(KeycloakSession, RealmModel, AccessToken, AuthenticatedClientSessionModel, boolean) |  | 0% |  | 0% | 8 | 8 | 15 | 15 | 1 | 1 |
| validateTokenReuseForIntrospection(KeycloakSession, RealmModel, AccessToken) |  | 0% |  | 0% | 2 | 2 | 11 | 11 | 1 | 1 |
| getAccess(UserModel, ClientModel, Stream) |  | 0% |  | 0% | 4 | 4 | 13 | 13 | 1 | 1 |
| isUserValid(KeycloakSession, RealmModel, AccessToken, UserModel) |  | 0% |  | 0% | 3 | 3 | 12 | 12 | 1 | 1 |
| verifyIDToken(KeycloakSession, RealmModel, String) |  | 0% | | n/a | 1 | 1 | 8 | 8 | 1 | 1 |
| getRequestedClientScopes(String, ClientModel) |  | 0% |  | 0% | 2 | 2 | 8 | 8 | 1 | 1 |
| getOIDCIdentityProviders(RealmModel, KeycloakSession) |  | 0% | | n/a | 1 | 1 | 7 | 7 | 1 | 1 |
| verifyConsentStillAvailable(KeycloakSession, UserModel, ClientModel, Stream) |  | 0% |  | 0% | 2 | 2 | 6 | 6 | 1 | 1 |
| lookupUserFromStatelessToken(KeycloakSession, RealmModel, AccessToken) |  | 0% |  | 0% | 3 | 3 | 6 | 6 | 1 | 1 |
| checkLogoutTokenForEvents(LogoutToken) |  | 0% |  | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
| createClientAccessToken(KeycloakSession, RealmModel, ClientModel, UserModel, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 3 | 3 | 1 | 1 |
| lambda$verifyConsentStillAvailable$6(UserConsentModel, ClientModel, UserModel, ClientScopeModel) |  | 0% |  | 0% | 3 | 3 | 5 | 5 | 1 | 1 |
| toRefreshToken(KeycloakSession, String) |  | 0% |  | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
| verifyIDTokenSignature(KeycloakSession, String) |  | 0% |  | 0% | 2 | 2 | 4 | 4 | 1 | 1 |
| transformAccessToken(KeycloakSession, AccessToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| transformAccessTokenResponse(KeycloakSession, AccessTokenResponse, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| transformUserInfoAccessToken(KeycloakSession, AccessToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| transformIDToken(KeycloakSession, IDToken, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 2 | 2 | 1 | 1 |
| toLogoutToken(String) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| lambda$validateLogoutTokenAgainstIdpProvider$13(String, OIDCIdentityProvider) |  | 0% | | n/a | 1 | 1 | 5 | 5 | 1 | 1 |
| responseBuilder(RealmModel, ClientModel, EventBuilder, KeycloakSession, UserSessionModel, ClientSessionContext) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| validateLogoutTokenAgainstIdpProvider(Stream, String, LogoutToken) |  | 0% | | n/a | 1 | 1 | 4 | 4 | 1 | 1 |
| lambda$getAccess$5(ClientModel, ClientScopeModel) |  | 0% | | n/a | 1 | 1 | 3 | 3 | 1 | 1 |
| dettachClientSession(AuthenticatedClientSessionModel) |  | 0% |  | 0% | 2 | 2 | 5 | 5 | 1 | 1 |
| formatTokenType(ClientModel) |  | 0% |  | 0% | 2 | 2 | 3 | 3 | 1 | 1 |
| getValidOIDCIdentityProvidersForBackchannelLogout(RealmModel, KeycloakSession, String, LogoutToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateLogoutTokenAgainstIdpProvider$11(OIDCIdentityProvider) |  | 0% |  | 0% | 2 | 2 | 1 | 1 | 1 | 1 |
| lambda$checkTokenValidForIntrospection$1(ClientModel, UserSessionModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$getOIDCIdentityProviders$14(KeycloakSession, IdentityProviderModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateTokenReuseForIntrospection$2(KeycloakSession, RealmModel, AccessToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateToken$0(KeycloakSession, RealmModel, RefreshToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| parseScopeParameter(String) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateLogoutTokenAgainstIdpProvider$12(LogoutToken, OIDCIdentityProvider) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$validateTokenReuseForIntrospection$3(UserSessionManager, RealmModel, AccessToken) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$transformIDToken$10(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$transformUserInfoAccessToken$9(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$transformAccessTokenResponse$8(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$transformAccessToken$7(Map.Entry) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| static {...} |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| TokenManager() |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |
| lambda$getAccess$4(ClientScopeModel) |  | 0% | | n/a | 1 | 1 | 1 | 1 | 1 | 1 |