JWT Token Manager

Generate, decode, verify, and analyze JSON Web Tokens

Generate JWT Token
Create a new JWT token with custom payload and settings
JWT Reference

Standard Claims

iss: Issuer - who created the token
sub: Subject - who the token is about
aud: Audience - who the token is for
exp: Expiration time (Unix timestamp)
nbf: Not before time (Unix timestamp)
iat: Issued at time (Unix timestamp)
jti: JWT ID - unique identifier

Common Algorithms

HS256: HMAC using SHA-256 (symmetric)
HS384: HMAC using SHA-384 (symmetric)
HS512: HMAC using SHA-512 (symmetric)
RS256: RSA using SHA-256 (asymmetric)
ES256: ECDSA using SHA-256 (asymmetric)
none: No signature (insecure)

Security Best Practices

• Use strong secret keys (minimum 256 bits)
• Set appropriate expiration times
• Validate all claims on the server
• Use HTTPS in production
• Never store sensitive data in payload
• Implement proper key rotation

Common Use Cases

• Authentication tokens
• API access tokens
• Single sign-on (SSO)
• Information exchange
• Temporary access grants
• Microservices communication