<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Decode an ID Token for an OIDC Application
API Access Management
Okta Classic Engine
Overview

This article describes the process to decode an Identity Token (ID Token) for an OpenID Connect (OIDC) application.

Applies To
  • Okta Identity Engine (OIE)
  • Okta Classic Engine
  • OpenID Connect (OIDC) Applications
Cause

Developers may want to inspect the ID token to ensure the expected information is being sent from Okta to the application.

Solution

The ID token, returned by an OIDC application, contains information about a user and their authentication status. The following steps will describe how to decode the ID token, available in JSON Web Token (JWT) format, to get the required information about the user:

  1. Assign a test user to the OIDC application.
  2. Go to the General tab of the OIDC Application and add https://localhost:8080 for the Login redirect URIs for testing purposes. Add any other URL as well, if needed.

Login

  1. Again, from the General tab of the OIDC Application, locate the Client ID, copy it, and save it somewhere.
  2. Follow the authorization code flow documentation at the Authorization Code flow documentation to construct the authorize call and complete the flow.
  3. Copy the ID token to Okta's jwt.io or token.dev. It will return information about this test user:

NOTE: To return groups in the token, make sure the Groups Claim is added, as shown in Attribute/Claim Missing from ID Token.

Related References

Loading
Decode an ID Token for an OIDC Application