JWK (JSON Web Key)
A JSON Web Key (JWK) represents a single public key, including various attributes that define its characteristics and usage.
JWKs are used in JWT authentication to verify signatures.
The key ID, a unique identifier for the key. This helps clients select the appropriate key for verification.
HFSdUzsX5GRQ7LrkqZusDAhyItKI3YADzfOjYFZ31QA
The key type, indicating the algorithm used with the key. Common values are "RSA" and "EC".
RSA
The algorithm intended for use with the key. It indicates how the key should be used when signing or verifying tokens.
RS256
The intended use of the key. Common uses are "sig" (signature) and "enc" (encryption).
sig
The modulus of the RSA key, used in key generation and verification.
6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY_LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss_jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj-KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY_mrhOeHAAEYmAXlJy-1EkNbpGwv4UI_4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT-eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3_u-TfwscsqUAgeXYoSf-S90JxVlDcxs4w
The exponent of the RSA key, which is used along with the modulus.
AQAB
An array of X.509 certificate strings, representing the public key's certificate chain. These certificates can be used for further validation of the key.
["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"]
The SHA-1 thumbprint of the X.509 certificate. This thumbprint provides a way to reference the certificate in a compact manner.
lcP9nH8u-OVlagJs6jJhS8SoTSQ
The SHA-256 thumbprint of the X.509 certificate, providing an alternative method for referencing the certificate.
pJZPEQrWJDfpyAHDsV3P3pykagsiPbDzYr2e7S-AorA
{
"kid": "HFSdUzsX5GRQ7LrkqZusDAhyItKI3YADzfOjYFZ31QA",
"kty": "RSA",
"alg": "RS256",
"use": "sig",
"n": "6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY_LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss_jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj-KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY_mrhOeHAAEYmAXlJy-1EkNbpGwv4UI_4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT-eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3_u-TfwscsqUAgeXYoSf-S90JxVlDcxs4w",
"e": "AQAB",
"x5c": [
"MIICmTCCAYECBgGSa1jnQzANBgkqhkiG9w0BAQsFADAQMQ4wDAYDVQQDDAVsYXRhbTAeFw0yNDEwMDgwODU1NDFaFw0zNDEwMDgwODU3MjFaMBAxDjAMBgNVBAMMBWxhdGFtMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY/LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss/jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj+KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY/mrhOeHAAEYmAXlJy+1EkNbpGwv4UI/4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT+eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3/u+TfwscsqUAgeXYoSf+S90JxVlDcxs4wIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQAs2QuLzYhtPKQJ2AAWDcl878gQYJvFZ4XadWm7clKkU66ljP/KwB7FFXWd+Us/F01wkJySSTqdQwIZKFuFilPGD+ybneyFf/VjSBZZUPkgVURFWGzUsIl/HlzzCQGvzSgIXOsUc7Io3L3VF5dkOqv95+piJWMhXKI293hJN/d5byjpjq2/8AP90eQPG85x9mAPPhOD4P3ML1H7UkzDINPqI9SPgccw600LGdWA6RnEVW2zmODNDUW9sHJJVVGdviNG6N3N5s9WT1/VA/kBzvqd4hqh90kG5UELpOsvGv78iyBKJXp6Ry6r2/Jjhv2Exlsc3sICMi4tSk4AFudB+qm9"
],
"x5t": "lcP9nH8u-OVlagJs6jJhS8SoTSQ",
"x5t#S256": "pJZPEQrWJDfpyAHDsV3P3pykagsiPbDzYr2e7S-AorA"
}