B. From the App
C. Use Run Task
D. Use env zero OIDC script template
E. Manually from env zero deployment
A. From the Credential Form
When creating an OIDC credential in the organization credentials page you can see the sub value in the last disabled form input:
B. From the App
Go to Organization Settings -> PoliciesNext to the “Enable OIDC” checkbox, click “show” ( the “show” button will only appear if OIDC is enabled )

C. Use Run Task
This simple node script will help decode the OIDC Token.- “Enable OIDC”
- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\

- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\
- Run a Task - under any existing env zero environment, select “Run a Task” from the env zero environment menu. Note: You will need administrative access to see this option.
- Copy and Paste this script:
- Hit Run a Task and open the console outputs under “Task Commands” step.
D. Using env zero OIDC Script Template
This env zero template, will run a decode script to help you view the contents of the OIDC token.-
“Enable OIDC”
- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\

- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\
- Clone or Fork the Repo: https://github.com/env0/customer-tools
-
Run an Environment - from VCS, and configure it with the repo you’ve cloned/forked to, and the folder path:
iam/oidc/decode-oidc - This will generate a step in the deployment that outputs the OIDC contents similar to this screenshot:
E. Manually from env zero deployment
To retrieve your organization’s unique Subject Identifier:-
“Enable OIDC”
- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\

- Under Organization > Settings > Policy - Check “Enable OIDC during deployments”\
-
Go to an existing environment and “Run a Task”\

-
Run the following command:
echo $ENV0_OIDC_TOKEN | base64\

-
Copy and Base64 Decode the Token:
echo “ZVXMU5pSXNJblI1Y0NJNklrcFhWQ0lzSW10cFpDSTZJazETmEwWkdU…” | base64 -d
-
Copy the Token and Inspect the decoded token using jwt.io\

-
Copy the Subject Identifier ”sub” (In this example:
auth0|632b8219674bde0224a96141)