Skip to content

JWT credentials#

You can use these credentials to authenticate the following nodes:

Supported authentication methods#

  • Passphrase: Signed with a secret with HMAC algorithm
  • Private key (PEM key): For use with Private Key JWT with RSA or ECDSA algorithm

Refer to the JSON Web Token spec for more details.

For a more verbose introduction, refer to the JWT website Introduction to JSON Web Tokens. Refer to JSON Web Token (JWT) Signing Algorithms Overview for more information on selecting between the two types and the algorithms involved.

Using Passphrase#

To configure this credential:

  1. Select the Key Type of Passphrase.
  2. Enter the Passphrase Secret
  3. Select the Algorithm used to sign the assertion. Refer to Available algorithms below for a list of supported algorithms.

Using private key (PEM key)#

To configure this credential: 1. Select the Key Type of PEM Key. 2. A Private Key: Obtained from generating a Key Pair. Refer to Generate RSA Key Pair for an example. 3. A Public Key: Obtained from generating a Key Pair. Refer to Generate RSA Key Pair for an example. 4. Select the Algorithm used to sign the assertion. Refer to Available algorithms below for a list of supported algorithms.

Available algorithms#

This n8n credential supports the following algorithms:

  • HS256
  • HS384
  • HS512
  • RS256
  • RS384
  • RS512
  • ES256
  • ES384
  • ES512
  • PS256
  • PS384
  • PS512
  • none
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy