JWK (JSON Web Key)
A JSON Web Key (JWK) represents a single public key, including various attributes that define its characteristics and usage.
JWKs are used in JWT authentication to verify signatures.
The key ID, a unique identifier for the key. This helps clients select the appropriate key for verification.
HFSdUzsX5GRQ7LrkqZusDAhyItKI3YADzfOjYFZ31QAThe key type, indicating the algorithm used with the key. Common values are "RSA" and "EC".
RSAThe algorithm intended for use with the key. It indicates how the key should be used when signing or verifying tokens.
RS256The intended use of the key. Common uses are "sig" (signature) and "enc" (encryption).
sigThe modulus of the RSA key, used in key generation and verification.
6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY_LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss_jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj-KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY_mrhOeHAAEYmAXlJy-1EkNbpGwv4UI_4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT-eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3_u-TfwscsqUAgeXYoSf-S90JxVlDcxs4wThe exponent of the RSA key, which is used along with the modulus.
AQABAn array of X.509 certificate strings, representing the public key's certificate chain. These certificates can be used for further validation of the key.
["MIICmTCCAYECBgGSa1jnQzANBgkqhkiG9w0BAQsFADAQMQ4wDAYDVQQDDAVsYXRhbTAeFw0yNDEwMDgwODU1NDFaFw0zNDEwMDgwODU3MjFaMBAxDjAMBgNVBAMMBWxhdGFtMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY/LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss/jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj+KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY/mrhOeHAAEYmAXlJy+1EkNbpGwv4UI/4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT+eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3/u+TfwscsqUAgeXYoSf+S90JxVlDcxs4wIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQAs2QuLzYhtPKQJ2AAWDcl878gQYJvFZ4XadWm7clKkU66ljP/KwB7FFXWd+Us/F01wkJySSTqdQwIZKFuFilPGD+ybneyFf/VjSBZZUPkgVURFWGzUsIl/HlzzCQGvzSgIXOsUc7Io3L3VF5dkOqv95+piJWMhXKI293hJN/d5byjpjq2/8AP90eQPG85x9mAPPhOD4P3ML1H7UkzDINPqI9SPgccw600LGdWA6RnEVW2zmODNDUW9sHJJVVGdviNG6N3N5s9WT1/VA/kBzvqd4hqh90kG5UELpOsvGv78iyBKJXp6Ry6r2/Jjhv2Exlsc3sICMi4tSk4AFudB+qm9"]The SHA-1 thumbprint of the X.509 certificate. This thumbprint provides a way to reference the certificate in a compact manner.
lcP9nH8u-OVlagJs6jJhS8SoTSQThe SHA-256 thumbprint of the X.509 certificate, providing an alternative method for referencing the certificate.
pJZPEQrWJDfpyAHDsV3P3pykagsiPbDzYr2e7S-AorA{
"kid": "HFSdUzsX5GRQ7LrkqZusDAhyItKI3YADzfOjYFZ31QA",
"kty": "RSA",
"alg": "RS256",
"use": "sig",
"n": "6NLoKDS41mlmtYD7FavFs1SY72TLojFVBY_LMlbuhdF2DudY1uUpbPnzE2rkU3HJiZrWSxfkRJmNKcCo2X8DrhbQp4lOavcAss_jNVNTZieEbQUHTp1WchAumzYS24BB0SMr0wNpYcxaj-KDttgkUb5sBycopr8WC8mcpL86ATOYoJ24E7YzY_mrhOeHAAEYmAXlJy-1EkNbpGwv4UI_4ofmY17FmnwDVcBLVIWtodKr8d4Gj3rzAT-eezN6WuRsLuMznI5gshkparlrZXoaLgOGFsPrW24cbAekSg1HWXzMSjfXlnhb3_u-TfwscsqUAgeXYoSf-S90JxVlDcxs4w",
"e": "AQAB",
"x5c": [
"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"
],
"x5t": "lcP9nH8u-OVlagJs6jJhS8SoTSQ",
"x5t#S256": "pJZPEQrWJDfpyAHDsV3P3pykagsiPbDzYr2e7S-AorA"
}