signer/verifier
Back
This is a
jsjws
sample program to generate and verify JSON Web Token(JWT).
demo
JWT signer
JWT verifier
JWT parser
© 2013
@kjur
JWT signer
Back
This is a sample program to generate a signed JSON Web Token(JWT).
(Step1) set claim
Issuer(iss)
Subject(sub)
Not Before Time(nbf)
Expiration Time(exp)
Issue At Time(iat)
JWT ID(jti)
Type(typ)
NOTE: As for 'time' representation, please see
here
in detail.
(Step2) Choose issuer key and JWS signing algorithm.
Private key or shared secret:
Choose JWS signature algorithm and default value:
none (no signature)
HS256 (HmacSHA256) with default shared key
HS512 (HmacSHA512) with default shared key
RS256 (SHA256withRSA RSA2048bit:z4) with default private key
RS384 (SHA384withRSA RSA2048bit:z4) with default private key
RS512 (SHA512withRSA RSA2048bit:z4) with default private key
ES256 (SHA256withECDSA NIST P-256) with default private key
ES384 (SHA384withECDSA NIST P-384) with default private key
PS256 (SHA256withRSAandMGF1 RSA2048bit:z4) with default private key
PS384 (SHA384withRSAandMGF1 RSA2048bit:z4) with default private key
PS512 (SHA512withRSAandMGF1 RSA2048bit:z4) with default private key
SHA256withRSA with PKCS#5 plain private key(z4)
SHA256withRSA with PKCS#8 plain private key(z4)
SHA256withRSA with PKCS#8 encrypted private key(z4)
Or specify signature algorithm, private key, private key passcode and/or shared secret:
passcode for private key:
NOTE: Off course you can set your own private key and passcode. Please care of proper signature algorithm when you set your own key and pass code.
(Step3) Press "Sign it!"
To generate signed JWT just pass 'Sign it!'.
© 2013
@kjur
JWT verifier
Back
This is a sample program to generate and verify JSON Web Token(JWT).
(Step1) Fill JWT
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLCJzdWIiOiJtYWlsdG86bWlrZUBleGFtcGxlLmNvbSIsIm5iZiI6MTM3ODI3NTMwMiwiZXhwIjoxMzc4Mjc4OTAyLCJpYXQiOjEzNzgyNzUzMDIsImp0aSI6ImlkMTIzNDU2IiwidHlwIjoiaHR0cHM6Ly9leGFtcGxlLmNvbS9yZWdpc3RlciJ9.fWNOjt3Xa72gc4uqFILE6tdf6TVqtC0Tws2w5rkllb0
(Step2) Choose proper public key or certificate to verify.
none (no signature)
HS* (HmacSHA*) with default shared key
default PKCS#8 public key (RSA z4) for RS* PS* JWT
default X.509 certificate (RSA z4) for RS* PS* JWT
default public key for ES256 (SHA256withECDSA NIST P-256 k1)
default X.509 certificate for ES256 (SHA256withECDSA NIST P-256 k1)
default public key for ES384 (SHA384withECDSA NIST P-384 k6)
default X.509 certificate for ES384 (SHA384withECDSA NIST P-384 k6)
NOTE: When you sign JWT with your own key, please fill your own public key or X.509 certificate to verify it.
(Step3) Press 'Verify'.
JWT Header
JWT Payload(Claim)
© 2013
@kjur
JWT parser
Back
This is a sample program just to parse JSON Web Token(JWT).
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLCJzdWIiOiJtYWlsdG86bWlrZUBleGFtcGxlLmNvbSIsIm5iZiI6MTM3ODI3NTMwMiwiZXhwIjoxMzc4Mjc4OTAyLCJpYXQiOjEzNzgyNzUzMDIsImp0aSI6ImlkMTIzNDU2IiwidHlwIjoiaHR0cHM6Ly9leGFtcGxlLmNvbS9yZWdpc3RlciJ9.fWNOjt3Xa72gc4uqFILE6tdf6TVqtC0Tws2w5rkllb0
JWT Header
JWT Payload(Claim)
© 2013
@kjur