Hi Attempting to test some metadata that's being ...
# support-questions-legacy
n
Hi Attempting to test some metadata that's being added into the access token when authenticating but having trouble decoding the token. I've assumed that it's similar to a standard JWT but that might be a mistake. I've tried with both the access token as is and I've also tested after removing characters following the first
/
. See examples in thread. Our tests are written in Ruby and I'd prefer to not have to use a Supertoken specific tool to decode. Any other approaches or pointers to how the access token is encoded are appreciated.
Copy code
access token -  "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsInZlcnNpb24iOiIyIn0%3D.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%3D.KbcOjlAzDPD0%2BbNJ%2BpOBLLOhObAZH6ItWyn67SjbdsStkXi0Ap2zCL96fzToXEvuiZ0XCOF/fDezCCZ3cJupnQlhq813UbY%2B/nfivgBqDRFwqtuI/qeKEsDV3fqA6VNoSN6PZlYUC55fO6lnUQkP509MLfvqF5Jf6PlpRlqiDEQ5UesRr5q29k7cu37mWqAYB6ReoqPfRCQn4tJortxXKrGgSRlfrFYmw5PT2Ltp4RyLa4aNVskWh8%2B%2BDAuKa5KQMROsAi/1mAtfyKwi6fPgeM%2BwpOHOuI%2BXJCt4q%2BjE1zRaMaR7qj2NQv/2qyqsZ%2Bty1nEQJFGqRkGy/BJP3XZg%2BA%3D%3D"

stripped - "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsInZlcnNpb24iOiIyIn0%3D.eyJzZXNzaW9uSGFuZGxlIjoiNzMwZTBlZTktYmFhNS00MTk1LTgxMmEtODZjODk1MjQ2NzkzIiwidXNlcklkIjoiN2JiMmU4NjgtOTVlZi00MTM3LTg3NzMtYzZmZjY0NTlmYzk2IiwicmVmcmVzaFRva2VuSGFzaDEiOiJiNWMwMzI3MWVhZTkyMDM1NjA3YjVhZmE5YTIyZGQyNTFiZGQ1NThlZjQ1NDU4OGMzYWU0MmY1NjUyN2M5ZTBlIiwidXNlckRhdGEiOnsidXNlcl9kYXRhIjp7ImVjb19hY2NvdW50X2lkIjoiNjJlM2Q4ZWZkOWRiYWUzYmUwNThmZjM4IiwiZm9yZXN0X3JvbGVzIjp7IjYyZTNkOGVkYjE4YjI3MDAwNzFiNWQ2MCI6WyJBRE1JTiJdfX19LCJleHBpcnlUaW1lIjoxNjU5MTAyOTc1ODA1LCJ0aW1lQ3JlYXRlZCI6MTY1OTA5OTM3NTgwNSwibG1ydCI6MTY1OTA5OTM3NTgwNX0%3D.KbcOjlAzDPD0%2BbNJ%2BpOBLLOhObAZH6ItWyn67SjbdsStkXi0Ap2zCL96fzToXEvuiZ0XCOF"
r
I see. You can checkout how the python or node SDK does the decoding https://github.com/supertokens/supertokens-python/blob/master/supertokens_python/recipe/session/jwt.py