Scroll to navigation

RNBYC(1) User Commands RNBYC(1)

NAME

rnbyc - JWK and JWT parser and generator

DESCRIPTION

rnbyc - JWK/JWKS parser and generator, JWT parser and serializer, supports signed, encrypted and nested JWTs

Version 1.1.8

COPYRIGHT

Copyright 2020-2022 Nicolas Mora <mail@babelouest.org>

This program is free software; you can redistribute it and/or modify it under the terms of the GPL 3

Command-line options:

-j --jwks

Action: JWKS, parse or generate keys and output JWKS

-g --generate <type>

Generate a key pair or a symmetric key <type> - values available: RSA[key size] (default key size: 4096), EC256, EC384, EC521, Ed25519, Ed448, X25519, X448, oct[key size] (default key size: 128 bits)

-i --stdin

Reads key to parse from stdin

-f --in-file

Reads key to parse from a file

-k --key-id

Specifies the key-id to add to the current key

-a --alg

Action: JWKS - Specifies the alg value to add to the current key Action: Serialize - Specifies the alg value to sign the token

-e --enc

Specifies the enc value to encrypt the token (default A128CBC)

-l --enc-alg

Specifies the encryption algorithm for key management of the token

-o --out-file

Specifies the output file for the private keys (or all the keys if no public file is specified) in the JWKS

-p --out-file-public

Specifies the output file for the public keys in the JWKS

-n --indent

JWKS output spaces indentation: 0 is compact mode, default is 2 spaces indent

-F --format

Output format, values available are JWK (default), PEM or DER

-x --split

Split JWKS output in public and private keys

-t --parse-token

Action: Parse token

-s --serialize-token

Action: serialize given claims in a token

-H --header

Display header of a parsed token

-C --claims

Display claims of a parsed token, default true

-P --public-key

Specifies the public key for key management encryption or signature verification Public key must be in JWKS format and can be either a JWKS string or a path to a JWKS file

-K --private-key

Specifies the private key for key management decryption or signature generation Public key must be in JWKS format and can be either a JWKS string or a path to a JWKS file

-S --self-signed

Verifies the JWT signature if the signed JWT has its public key included in its header as 'jwk', 'x5c' or 'x5u' parameter

-W --password

Specifies the password for key management encryption/decryption using PBES2 alg or signature generation/verification using HS alg

-u --x5u-flags

Set x5u flags to retrieve online certificate, values available are:
cert: ignore server certificate errors (self-signed, expired, etc.) follow: follow jwks_uri redirection if any values can be contatenated, e.g. --x5u-flags cert,follow

-v --version

Print rnbyc's current version

-h --help

Print this message

-d --debug

Display debug messages

SEE ALSO

The full documentation for rnbyc is maintained as a Texinfo manual. If the info and rnbyc programs are properly installed at your site, the command

info rnbyc

should give you access to the complete manual.

September 2023 rnbyc 1.1.8