AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() decode: paste in the signed JWT in the box on the left-hand side.For details on algorithms, see the JWA specification. For generating or verifying encrypted JWT, it supports RSA keys with RSA-OAEP or RSA-OAEP-256 key encryption, EC keys with various ECDH key encryption (always with the P-256 curve), as well as PBES2 key encryption algorithms and the Direct Key approach. For generating and verifying signed JWT, this page supports RSA, HMAC, or ECDSA algorithms.It's good hygiene to never submit or enter private information - including production private keys, or production credentials or tokens - into a website you do not own or trust. Information from the decoding or decrypting also stays in the browser. Information that you paste here, including JWT and keys, whether secret, private or public, never leaves your browser.This tool uses EcmaScript v9, and webcrypto it will run only on modern, current browsers.
0 Comments
Read More
Leave a Reply. |