← cd /

> JWT Generator

// Learn how JSON Web Tokens are built step by step

← Back to JWT Decoder
Configuration
HMAC using SHA-256 — symmetric, shared secret
Step-by-Step JWT Generation
Step 1: Header Encoding
READ-ONLY
{
  "alg": "HS256",
  "typ": "JWT"
}
Base64Url Encode
ewogICJhbGciOiAiSFMyNTYiLAogICJ0eXAiOiAiSldUIgp9
Step 2: Payload Encoding
READ-ONLY
{
  "sub": "1234567890",
  "name": "John Doe",
  "iat": 1516239022
}
Base64Url Encode
ewogICJzdWIiOiAiMTIzNDU2Nzg5MCIsCiAgIm5hbWUiOiAiSm9obiBEb2UiLAogICJpYXQiOiAxNTE2MjM5MDIyCn0
Step 3: Signature Creation
ewogICJhbGciOiAiSFMyNTYiLAogICJ0eXAiOiAiSldUIgp9.ewogICJzdWIiOiAiMTIzNDU2Nzg5MCIsCiAgIm5hbWUiOiAiSm9obiBEb2UiLAogICJpYXQiOiAxNTE2MjM5MDIyCn0
HMAC-SHA-256 with secret
Step 4: Final Token
ewogICJhbGciOiAiSFMyNTYiLAogICJ0eXAiOiAiSldUIgp9.ewogICJzdWIiOiAiMTIzNDU2Nzg5MCIsCiAgIm5hbWUiOiAiSm9obiBEb2UiLAogICJpYXQiOiAxNTE2MjM5MDIyCn0.
How JWT Validation Works
1.
SplitThe token is split into three parts: header, payload, and signature.
2.
DecodeThe header and payload are Base64Url-decoded to reveal JSON.
3.
Verify SignatureThe signature is recomputed using the header, payload, and the secret/key. If it matches the token’s signature, the token is authentic.
4.
Check ClaimsStandard claims like exp, nbf, and iss are validated against current time and expected values.
5.
TrustIf all checks pass, the payload can be trusted.