Tiny Online Tools logoTiny Online Toolssearch搜索工具…grid_view全部工具
首页chevron_right安全工具chevron_rightJWT 签名验证器JWT 签名验证器

JWT 签名验证器

在浏览器中本地验证 HMAC JWT 签名。

相似工具

JWT 解码器

JWT 解码器

解码并检查 JWT 令牌。

PDF 元数据编辑器

PDF 元数据编辑器

查看并编辑 PDF 元数据,包括标题、作者、主题、关键词和创建者。

SQL 压缩器

SQL 压缩器

压缩 SQL queries by removing comments 和 collapsing whitespace.

视频转 MP3

视频转 MP3

从视频文件中提取音频,并以带波形可视化的 WAV 格式导出。

图片 DPI 转换

图片 DPI 转换

通过更新元数据或重新采样到新分辨率,修改 PNG 和 JPEG 图片的 DPI。

图片翻转工具

图片翻转工具

水平、垂直或双向翻转图片。

HTML 表格生成器

HTML 表格生成器

根据简单的逗号分隔行生成 HTML 表格标记。

apps

更多工具

浏览我们完整的免费在线工具集合。

JWT Signature Verifier

While the JWT 解码r reveals what in格式化ion a token contains, the signature verifier proves the token is legitimate. A JWT's signature is 创建d by hashing the header and payload with a secret key—only the server that 创建d the token can produce a valid signature. This tool verifies HMAC-based JWT signatures (HS256, HS384, HS512), making it essential for debugging authentication issues and validating tokens locally.

Signature verification process

When you receive a JWT, the signature proves two things: (1) the token was 创建d by someone with the secret key, and (2) the header and payload haven't been modified since creation. To verify, you take the header and payload, apply the same HMAC algorithm with the secret key, and compare the result to the signature. If they match, the token is valid and trustworthy.

HMAC vs. asymmetric signing

HMAC signatures (HS256, HS384, HS512) use a shared secret—both the server that 创建s the token and the client that verifies it know the same secret. This works well when both parties are under your control (like a backend service and a separate API service). For public APIs where you cannot share a secret with users, asymmetric signing (RS256, ES256) is better—the server signs with a private key and the client verifies with a public key.

Debugging failed authentication

If a client claims their token is valid but your server rejects it, this tool helps diagnose the issue. Paste the token and the secret your server uses, then verify the signature. If it fails, the token might have been tampered with, or the client is using the wrong secret. If it passes, the issue lies elsewhere (perhaps in claim validation or token expiration).

Development and testing

This tool is invaluable for testing authentication flows without running your full backend. 生成 a JWT, paste it here with your secret to verify it was signed correctly, or manually modify the payload and confirm the signature fails—proving your signature verification actually works.