Skip to content

Decode JSON Web Token on the Command Line

Published: | 2 min read

Table of contents

Open Table of contents


As a developer I will come across JSON Web Tokens (JWTs) all the time. In many cases during development and issue resolution I will need to know, what information is contained within the token (header and payload).

Since the token will contain private information, I am not comfortable using online tools to decode the token. Luckily this can easily be accomplished on the Command Line with help of OpenSSL. Let’s have a look how it is done on macOS.

Obtain test token

For testing purposes, I use a token from


JWT contains three parts, separated by dots.

Zsh function time

I am using zsh as my shell, so all I need to do, is add a new function to my .zshrc:

function jwt() {
  for part in 1 2; do
    b64="$(cut -f$part -d. <<< "$1" | tr '_-' '/+')"
    n=$((len % 4))
    if [[ 2 -eq n ]]; then
    elif [[ 3 -eq n ]]; then
    d="$(openssl enc -base64 -d -A <<< "$b64")"
    python -mjson.tool <<< "$d"
    # don't decode further if this is an encrypted JWT (JWE)
    if [[ 1 -eq part ]] && grep '"enc":' <<< "$d" >/dev/null ; then
        exit 0

What happens is basically this:


To decode, I will start a new shell, and run the function with the token as an argument (Remember to add the quotes):

jwt "eyJ..."

This will output the Header and Payload in a nice and easily readable format:

    "alg": "HS256",
    "typ": "JWT"
    "sub": "1234567890",
    "name": "John Doe",
    "iat": 1516239022

And just like that, I can see what is contained within the token, and I can continue with the task I was actually doing.

Further Reading and inspiration