JWT Reference
Common Claims
iss- Issuersub- Subjectaud- Audienceexp- Expiration Timenbf- Not Beforeiat- Issued Atjti- JWT ID
Algorithms
HS256- HMAC SHA-256HS384- HMAC SHA-384HS512- HMAC SHA-512RS256- RSA SHA-256RS384- RSA SHA-384RS512- RSA SHA-512ES256- ECDSA SHA-256
Security Best Practices
- Always verify signatures server-side
- Use strong algorithms (RS256, ES256)
- Set appropriate expiration times
- Validate all claims
- Never store sensitive data in JWTs
- Use HTTPS for token transmission
Common Vulnerabilities
alg: none- Algorithm bypass- Weak secrets for HMAC
- Missing expiration validation
- Improper audience validation
- Key confusion attacks
- Token leakage in logs/URLs