Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 573

JWS

What is JWS?

JWSJSON Web Signature (RFC 7515) is a JOSE format that protects the integrity and origin of arbitrary content using a digital signature or MAC over a Base64URL-encoded header and payload.


A JWS (RFC 7515) ties a payload to its signer through a signature over the concatenation BASE64URL(header) || '.' || BASE64URL(payload). The Compact Serialization, three dot-separated Base64URL segments, is what most developers know as a JWT-style token; the JSON Serialization (general and flattened) supports multiple signatures and is used in W3C Verifiable Credentials and package signing. Algorithms are listed in RFC 7518 (HS256, RS256, PS256, ES256, EdDSA) plus RFC 8037. Implementers must reject alg:none, refuse server-controlled alg switching that turns RSA verification into HMAC, validate the kid against a trusted JWK Set, and clamp lifetimes. Stable libraries include jose, node-jose, jjwt and python-jwt.

Examples

  1. 01

    An OAuth 2.0 JWT access token is a JWS Compact Serialization signed with RS256 over a claim set.

  2. 02

    A signed software-update manifest distributed as a flattened JWS with kid pointing at a vendor JWK.

Frequently asked questions

What is JWS?

JSON Web Signature (RFC 7515) is a JOSE format that protects the integrity and origin of arbitrary content using a digital signature or MAC over a Base64URL-encoded header and payload. It belongs to the Cryptography category of cybersecurity.

What does JWS mean?

JSON Web Signature (RFC 7515) is a JOSE format that protects the integrity and origin of arbitrary content using a digital signature or MAC over a Base64URL-encoded header and payload.

How does JWS work?

A JWS (RFC 7515) ties a payload to its signer through a signature over the concatenation BASE64URL(header) || '.' || BASE64URL(payload). The Compact Serialization, three dot-separated Base64URL segments, is what most developers know as a JWT-style token; the JSON Serialization (general and flattened) supports multiple signatures and is used in W3C Verifiable Credentials and package signing. Algorithms are listed in RFC 7518 (HS256, RS256, PS256, ES256, EdDSA) plus RFC 8037. Implementers must reject alg:none, refuse server-controlled alg switching that turns RSA verification into HMAC, validate the kid against a trusted JWK Set, and clamp lifetimes. Stable libraries include jose, node-jose, jjwt and python-jwt.

How do you defend against JWS?

Defences for JWS typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for JWS?

Common alternative names include: JSON Web Signature.

Related terms

See also