![]() ![]() Huge thanks to Lukas Lihotzki for the AMAZING Gist comment. Once active, you can decode JWTs from the Linux command line with relative ease: After a couple of slight modifications I was super stoked with the following jq incantation (huge thanks Lucas!): While looking into command line JWT decoders, I came across the following gist describing how to do this with jq. There are plenty of online tools available to decode JWTs, but being a command line warrior I wanted something I could use from a bash prompt. The most common form of bearer token is the JWT (JSON Web Token), which is a string with three hexadecimal components separated by periods (e.g., ). jwt.ms Enter token below (it never leaves your browser): Decoded Token Claims Claim type Value Notes Claims The issclaim in AAD contains the tenant ID. At the core of OAUTH2 is the concept of a bearer token. The signature is added to the result in the same way (encoded and separated by a dot).Over the past few months I’ve been spending some of my spare time trying to understand OAUTH2 and OIDC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |