Security Tools
JWT claims reference with algorithm comparison. Quick lookup for JSON Web Token development.
issIssuer — identifies the principal that issued the JWT
"iss": "https://auth.example.com"subSubject — identifies the principal that is the subject of the JWT
"sub": "user-12345"audAudience — identifies the recipients the JWT is intended for
"aud": "https://api.example.com"expExpiration Time — time after which the JWT must not be accepted (Unix timestamp)
"exp": 1700000000nbfNot Before — time before which the JWT must not be accepted (Unix timestamp)
"nbf": 1699900000iatIssued At — time at which the JWT was issued (Unix timestamp)
"iat": 1699900000jtiJWT ID — unique identifier for the JWT, used to prevent replay attacks
"jti": "abc-123-def-456"nameFull name of the user (OpenID Connect)
"name": "Jane Doe"emailEmail address of the user (OpenID Connect)
"email": "jane@example.com"rolesCustom claim for user roles (not standard, but common)
"roles": ["admin", "editor"]scopeOAuth 2.0 scopes granted to the token
"scope": "read write"typToken type (header claim)
"typ": "JWT"algrequiredAlgorithm used to sign the token (header claim)
"alg": "HS256"kidKey ID — hint for which key was used to sign (header claim)
"kid": "key-2024-01"